CVE-2011-3639

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

References

http://rhn.redhat.com/errata/RHSA-2012-0128.html

http://svn.apache.org/viewvc?view=revision&revision=1188745

http://www.debian.org/security/2012/dsa-2405

https://bugzilla.redhat.com/show_bug.cgi?id=752080

Details

Source: MITRE

Published: 2011-11-30

Updated: 2017-12-29

Type: CWE-20

Risk Information

CVSS v2

Base Score: 4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 8.6

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:http_server:2.0.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.26:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.27:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.29:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.33:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.34:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a1:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a2:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a3:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a4:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a5:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a6:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a7:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a8:*:*:*:*:*:*:*:*

cpe:2.3:a:apache:http_server2.0a9:*:*:*:*:*:*:*:*

Tenable Plugins

View all (14 total)

IDNameProductFamilySeverity
83578SUSE SLES10 Security Update : apache2 (SUSE-SU-2013:0469-1)NessusSuSE Local Security Checks
medium
69653Amazon Linux AMI : httpd (ALAS-2012-46)NessusAmazon Linux Local Security Checks
medium
68488Oracle Linux 5 : httpd (ELSA-2012-0323)NessusOracle Linux Local Security Checks
medium
68458Oracle Linux 6 : httpd (ELSA-2012-0128)NessusOracle Linux Local Security Checks
medium
61261Scientific Linux Security Update : httpd on SL5.x i386/x86_64 (20120221)NessusScientific Linux Local Security Checks
medium
61245Scientific Linux Security Update : httpd on SL6.x i386/x86_64 (20120213)NessusScientific Linux Local Security Checks
medium
58811HP System Management Homepage < 7.0 Multiple VulnerabilitiesNessusWeb Servers
critical
58085RHEL 5 : httpd (RHSA-2012:0323)NessusRed Hat Local Security Checks
medium
57960CentOS 6 : httpd (CESA-2012:0128)NessusCentOS Local Security Checks
medium
57931RHEL 6 : httpd (RHSA-2012:0128)NessusRed Hat Local Security Checks
medium
57875Apache HTTP Server mod_proxy Reverse Proxy HTTP 0.9 Information DisclosureNessusWeb Servers
medium
57851Debian DSA-2405-1 : apache2 - multiple issuesNessusDebian Local Security Checks
medium
57298SuSE 10 Security Update : Apache2 (ZYPP Patch Number 7882)NessusSuSE Local Security Checks
medium
57090SuSE 11.1 Security Update : Apache2 (SAT Patch Number 5482)NessusSuSE Local Security Checks
medium