First published: Tue Jun 01 2021(Updated: )
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.47 | 2.4.47 |
Apache Http Server | >=2.4.6<=2.4.46 | |
Fedora | =34 | |
Fedora | =35 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
oracle instantis enterprisetrack | =17.1 | |
oracle instantis enterprisetrack | =17.2 | |
oracle instantis enterprisetrack | =17.3 | |
Oracle Sun ZFS Storage Appliance Kit | =8.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-17567.
The severity of CVE-2019-17567 is medium.
Versions 2.4.6 to 2.4.46 of Apache HTTP Server are affected.
To fix CVE-2019-17567, upgrade to version 2.4.47 of Apache HTTP Server.
You can find more information about CVE-2019-17567 at the following references: [1] [2] [3].