|   | 
| 
 | 
Message-ID: <1622544225.CLGKNUAI@httpd.apache.org>
Date: Wed, 09 Jun 2021 23:11:00 +0200
From: Christophe JAILLET <jailletc36@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2019-17567: Apache httpd: mod_proxy_wstunnel tunneling of non Upgraded connections
CVE-2019-17567: mod_proxy_wstunnel tunneling of non Upgraded connections
Severity: moderate
Vendor: The Apache Software Foundation
Versions Affected:
httpd 2.4.6 to 2.4.46
Description:
Apache HTTP Server 2.4.6 to 2.4.46
mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
    
Mitigation:
Configure mod_proxy_wstunnel on URLs that are always Upgraded by the origin server
Credit:
Reported by Mikhail Egorov (<0ang3el gmail.com>)
References:
https://httpd.apache.org/security/vulnerabilities_24.html
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.