First published: Wed Jun 08 2022(Updated: )
Apache HTTP Server could allow a remote attacker to obtain sensitive information, caused by an error in mod_lua with websockets. An attacker could exploit this vulnerability to return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/httpd | <2.4.54 | 2.4.54 |
redhat/httpd | <0:2.4.53-7.el9 | 0:2.4.53-7.el9 |
redhat/httpd24-httpd | <0:2.4.34-23.el7.5 | 0:2.4.34-23.el7.5 |
Apache HTTP server | <=2.4.53 | |
NetApp Clustered Data ONTAP | ||
Fedoraproject Fedora | =35 | |
Fedoraproject Fedora | =36 |
Disabling mod_lua and restarting httpd will mitigate this flaw.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-30556 is a vulnerability in Apache HTTP Server that allows a remote attacker to obtain sensitive information.
CVE-2022-30556 affects Apache HTTP Server by causing an error in mod_lua with websockets, allowing an attacker to return lengths to applications that point past the end of the allocated storage for the buffer.
The severity of CVE-2022-30556 is high with a severity score of 7.5.
Apache HTTP Server versions 2.4.53 and earlier are affected by CVE-2022-30556.
To mitigate CVE-2022-30556, it is recommended to update Apache HTTP Server to version 2.4.54.