First published: Sat Nov 10 2018(Updated: )
Caddy through 0.11.0 sends incorrect certificates for certain invalid requests, making it easier for attackers to enumerate hostnames. Specifically, when unable to match a Host header with a vhost in its configuration, it serves the X.509 certificate for a randomly selected vhost in its configuration. Repeated requests (with a nonexistent hostname in the Host header) permit full enumeration of all certificates on the server. This generally permits an attacker to easily and accurately discover the existence of and relationships among hostnames that weren't meant to be public, though this information could likely have been discovered via other methods with additional effort.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/caddyserver/caddy | <0.11.1 | 0.11.1 |
Caddyserver Caddy | <=0.11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-19148 is a vulnerability in Caddy server version 0.11.0 and earlier that allows attackers to enumerate hostnames by sending invalid requests.
CVE-2018-19148 has a severity value of 3.7, which is considered medium.
CVE-2018-19148 affects Caddy server versions up to 0.11.0, where it sends incorrect certificates for certain invalid requests, making it easier for attackers to enumerate hostnames.
Yes, you can find more information about CVE-2018-19148 in the following references: [link1](https://github.com/mholt/caddy/issues/1303), [link2](https://github.com/mholt/caddy/issues/2334), [link3](https://github.com/mholt/caddy/pull/2015).
Yes, the fix for CVE-2018-19148 is to upgrade Caddy server to a version later than 0.11.0.