|
Message-ID: <1622544225.CLGKNUAI@httpd.apache.org> Date: Wed, 09 Jun 2021 23:11:00 +0200 From: Christophe JAILLET <jailletc36@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2019-17567: Apache httpd: mod_proxy_wstunnel tunneling of non Upgraded connections CVE-2019-17567: mod_proxy_wstunnel tunneling of non Upgraded connections Severity: moderate Vendor: The Apache Software Foundation Versions Affected: httpd 2.4.6 to 2.4.46 Description: Apache HTTP Server 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured. Mitigation: Configure mod_proxy_wstunnel on URLs that are always Upgraded by the origin server Credit: Reported by Mikhail Egorov (<0ang3el gmail.com>) References: https://httpd.apache.org/security/vulnerabilities_24.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.