First published: Wed Sep 02 2020(Updated: )
FreedomBox through 20.13 allows remote attackers to obtain sensitive information from the /server-status page of the Apache HTTP Server, because a connection from the Tor onion service (or from PageKite) is considered a local connection. This affects both the freedombox and plinth packages of some Linux distributions, but only if the Apache mod_status module is enabled.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Freedombox | <=20.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-25073 is considered a high severity vulnerability as it allows remote attackers to access sensitive information from the Apache HTTP Server's /server-status page.
To fix CVE-2020-25073, users should upgrade to Freedombox version 20.14 or later, which addresses this security issue.
The potential impacts of CVE-2020-25073 include unauthorized access to sensitive data which could lead to further exploitation of the system.
CVE-2020-25073 affects Freedombox versions up to and including 20.13.
Yes, CVE-2020-25073 can be exploited remotely by attackers who manage to connect through a Tor onion service or PageKite.