CVE-2019-17567
Published: 10 June 2021
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
Notes
Author | Note |
---|---|
mdeslaur | The patches required to fix this in stable releases are quite intrusive and change behaviour. It may not make sense to backport them to stable releases. |
Priority
Status
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
References
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
- https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
- http://www.openwall.com/lists/oss-security/2021/06/10/2
- https://www.cve.org/CVERecord?id=CVE-2019-17567
- NVD
- Launchpad
- Debian