Your submission was sent successfully! Close

CVE-2021-44224

Published: 20 December 2021

A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).

Priority

Medium

CVSS 3 base score: 8.2

Status

Package Release Status
apache2
Launchpad, Ubuntu, Debian
Upstream
Released (2.4.52)
Ubuntu 21.10 (Impish Indri)
Released (2.4.48-3.1ubuntu3.2)
Ubuntu 21.04 (Hirsute Hippo)
Released (2.4.46-4ubuntu1.5)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.4.41-4ubuntu3.9)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.4.29-1ubuntu4.21)
Ubuntu 16.04 ESM (Xenial Xerus)
Released (2.4.18-2ubuntu3.17+esm4)
Ubuntu 14.04 ESM (Trusty Tahr)
Released (2.4.7-1ubuntu4.22+esm3)
Patches:
Upstream: https://svn.apache.org/viewvc?view=revision&revision=1895955
Upstream: https://svn.apache.org/viewvc?view=revision&revision=1896044
Upstream: https://github.com/apache/httpd/commit/a962ba73047b5478d702c8ad09fd1a167e1d3736
Upstream: https://github.com/apache/httpd/commit/a0521d289ae14e4ac004811dc1ef91b3e118a2f6