First published: Mon Apr 01 2019(Updated: )
A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-73.jbcs.el6 | 0:1.6.3-73.jbcs.el6 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-54.jbcs.el6 | 0:1.6.1-54.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-9.jbcs.el6 | 0:1.0.6-9.jbcs.el6 |
redhat/jbcs-httpd24-curl | <0:7.64.1-21.jbcs.el6 | 0:7.64.1-21.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-41.jbcs.el6 | 0:2.4.37-41.jbcs.el6 |
redhat/jbcs-httpd24-jansson | <0:2.11-24.jbcs.el6 | 0:2.11-24.jbcs.el6 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-10.jbcs.el6 | 0:1.39.2-10.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-4.jbcs.el6 | 1:1.1.1c-4.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-73.jbcs.el7 | 0:1.6.3-73.jbcs.el7 |
redhat/jbcs-httpd24-apr-util | <0:1.6.1-54.jbcs.el7 | 0:1.6.1-54.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-9.jbcs.el7 | 0:1.0.6-9.jbcs.el7 |
redhat/jbcs-httpd24-curl | <0:7.64.1-21.jbcs.el7 | 0:7.64.1-21.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-41.jbcs.el7 | 0:2.4.37-41.jbcs.el7 |
redhat/jbcs-httpd24-jansson | <0:2.11-24.jbcs.el7 | 0:2.11-24.jbcs.el7 |
redhat/jbcs-httpd24-nghttp2 | <0:1.39.2-10.jbcs.el7 | 0:1.39.2-10.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-4.jbcs.el7 | 1:1.1.1c-4.jbcs.el7 |
redhat/httpd | <0:2.4.6-90.el7 | 0:2.4.6-90.el7 |
redhat/httpd24 | <0:1.1-19.el6 | 0:1.1-19.el6 |
redhat/httpd24-httpd | <0:2.4.34-15.el6 | 0:2.4.34-15.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el6 | 0:1.7.1-8.el6 |
redhat/httpd24 | <0:1.1-19.el7 | 0:1.1-19.el7 |
redhat/httpd24-httpd | <0:2.4.34-15.el7 | 0:2.4.34-15.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el7 | 0:1.7.1-8.el7 |
Apache HTTP server | >=2.4.0<=2.4.38 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Fedoraproject Fedora | =28 | |
Fedoraproject Fedora | =29 | |
Fedoraproject Fedora | =30 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =18.04 | |
Canonical Ubuntu Linux | =18.10 | |
redhat/httpd | <2.4.39 | 2.4.39 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.62-3 |
This flaw can be mitigation by replacing multiple consecutive slashes, used in directives that match against the path component of the request URL with regular expressions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2019-0220 is low with a CVSS score of 3.3.
CVE-2019-0220 allows an attacker to bypass intended access restrictions and perform unauthorized actions.
To fix CVE-2019-0220, update your Apache HTTP Server to version 2.4.39 or apply the appropriate patch provided by RedHat.
You can find more information about CVE-2019-0220 on the official Apache HTTP Server website, the Apache HTTP Server changelog, and the RedHat Bugzilla page.
The Common Vulnerabilities and Exposures (CVE) ID for this vulnerability is CVE-2019-0220.