First published: Wed Aug 14 2019(Updated: )
A cross-site scripting vulnerability was found in Apache httpd, affecting the mod_proxy error page. Under certain circumstances, a crafted link could inject content into the HTML displayed in the error page, potentially leading to client-side exploitation.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el6 | 0:1.6.3-86.jbcs.el6 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el6 | 0:1.0.6-21.jbcs.el6 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el6 | 0:2.4.37-52.jbcs.el6 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el6 | 1:1.1.1c-16.jbcs.el6 |
redhat/jbcs-httpd24-apr | <0:1.6.3-86.jbcs.el7 | 0:1.6.3-86.jbcs.el7 |
redhat/jbcs-httpd24-brotli | <0:1.0.6-21.jbcs.el7 | 0:1.0.6-21.jbcs.el7 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-52.jbcs.el7 | 0:2.4.37-52.jbcs.el7 |
redhat/jbcs-httpd24-openssl | <1:1.1.1c-16.jbcs.el7 | 1:1.1.1c-16.jbcs.el7 |
redhat/httpd24 | <0:1.1-19.el6 | 0:1.1-19.el6 |
redhat/httpd24-httpd | <0:2.4.34-15.el6 | 0:2.4.34-15.el6 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el6 | 0:1.7.1-8.el6 |
redhat/httpd24 | <0:1.1-19.el7 | 0:1.1-19.el7 |
redhat/httpd24-httpd | <0:2.4.34-15.el7 | 0:2.4.34-15.el7 |
redhat/httpd24-nghttp2 | <0:1.7.1-8.el7 | 0:1.7.1-8.el7 |
redhat/httpd | <2.4.41 | 2.4.41 |
debian/apache2 | 2.4.62-1~deb11u1 2.4.62-1~deb11u2 2.4.62-1~deb12u2 2.4.63-1 | |
Apache Http Server | >=2.4.0<=2.4.39 | |
openSUSE | =15.0 | |
openSUSE | =15.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
Red Hat Software Collection | =1.0 | |
Fedoraproject Fedora | =30 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
NetApp Clustered Data ONTAP | <=9.5 | |
NetApp Clustered Data ONTAP | =9.6 | |
NetApp Clustered Data ONTAP | =9.6-p1 | |
NetApp Clustered Data ONTAP | =9.6-p3 | |
NetApp Clustered Data ONTAP | =9.6-p4 | |
NetApp Clustered Data ONTAP | =9.6-p7 | |
NetApp Clustered Data ONTAP | =9.6-p8 | |
oracle communications element manager | =8.0.0 | |
oracle communications element manager | =8.1.0 | |
oracle communications element manager | =8.1.1 | |
oracle communications element manager | =8.2.0 | |
Oracle Enterprise Manager Ops Center | =12.3.3 | |
Oracle Enterprise Manager Ops Center | =12.4.0 | |
Oracle Secure Global Desktop | =5.4 | |
Oracle Secure Global Desktop | =5.5 | |
Debian | =8.0 | |
Debian | =9.0 | |
Debian | =10.0 | |
Fedora | =30 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.04 |
This flaw is only exploitable if Proxy* directives are used in Apache httpd configuration. The following command can be used to search for possible vulnerable configurations: grep -R '^\s*Proxy' /etc/httpd/ See https://httpd.apache.org/docs/2.4/mod/mod_proxy.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
The severity of CVE-2019-10092 is medium with a CVSS score of 6.1.
CVE-2019-10092 affects Apache httpd versions 2.4.0-2.4.39, causing a limited cross-site scripting issue in the mod_proxy error page.
An attacker can exploit CVE-2019-10092 by causing the link on the error page to be malformed and redirecting to a page of their choice.
CVE-2019-10092 affects Apache HTTP Server versions 2.4.0-2.4.39.
You can find more information about CVE-2019-10092 on Bugzilla Red Hat, Apache HTTP Server security vulnerabilities page, and Red Hat support policy updates.