First published: Tue Mar 07 2023(Updated: )
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.51-39.el8 | 0:2.4.51-39.el8 |
redhat/jbcs-httpd24-httpd | <0:2.4.51-39.el7 | 0:2.4.51-39.el7 |
redhat/httpd | <0:2.4.6-98.el7_9.7 | 0:2.4.6-98.el7_9.7 |
redhat/httpd | <0:2.4.53-7.el9_1.5 | 0:2.4.53-7.el9_1.5 |
redhat/httpd | <0:2.4.51-7.el9_0.4 | 0:2.4.51-7.el9_0.4 |
redhat/httpd24-httpd | <0:2.4.34-23.el7.6 | 0:2.4.34-23.el7.6 |
>=2.4.0<=2.4.55 | ||
Apache HTTP server | >=2.4.0<=2.4.55 | |
redhat/httpd | <2.4.56 | 2.4.56 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2023-25690 is a vulnerability found in httpd, specifically in mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55.
CVE-2023-25690 has a severity rating of critical (9 out of 10).
CVE-2023-25690 affects Apache HTTP Server versions 2.4.0 through 2.4.55, jbcs-httpd24-httpd versions 2.4.51-39.el8 and 2.4.51-39.el7, httpd version 2.4.6-98.el7_9.7, and httpd versions 2.4.53-7.el9_1.5 and 2.4.51-7.el9_0.4.
To fix CVE-2023-25690, it is recommended to update to the latest patched versions of the affected software mentioned in the advisory.
More information about CVE-2023-25690 can be found on the official CVE website, NIST NVD, Apache HTTP Server security vulnerabilities page, and the Red Hat Bugzilla and Errata pages.