CVE-2021-44224
Published: 20 December 2021
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
Notes
Author | Note |
---|---|
mdeslaur | fixed by r1895955+r1896044 in 2.4.x |
Priority
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
upstream |
Released
(2.4.52)
|
bionic |
Released
(2.4.29-1ubuntu4.21)
|
|
focal |
Released
(2.4.41-4ubuntu3.9)
|
|
hirsute |
Released
(2.4.46-4ubuntu1.5)
|
|
impish |
Released
(2.4.48-3.1ubuntu3.2)
|
|
jammy |
Released
(2.4.52-1ubuntu1)
|
|
Patches: upstream: https://svn.apache.org/viewvc?view=revision&revision=1895955 upstream: https://svn.apache.org/viewvc?view=revision&revision=1896044 upstream: https://github.com/apache/httpd/commit/a962ba73047b5478d702c8ad09fd1a167e1d3736 upstream: https://github.com/apache/httpd/commit/a0521d289ae14e4ac004811dc1ef91b3e118a2f6 |
Severity score breakdown
Parameter | Value |
---|---|
Base score | 8.2 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | High |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H |