A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
https://security.netapp.com/advisory/ntap-20211008-0004/
https://lists.apache.org/thread.html/[email protected]%3Cbugs.httpd.apache.org%3E
https://www.debian.org/security/2021/dsa-4982
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cusers.httpd.apache.org%3E
https://www.tenable.com/security/tns-2021-17
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://cert-portal.siemens.com/productcert/pdf/ssa-685781.pdf
Source: MITRE
Published: 2021-09-16
Updated: 2022-10-05
Type: CWE-918
Base Score: 6.8
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 8.6
Severity: MEDIUM
Base Score: 9
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Impact Score: 6
Exploitability Score: 2.2
Severity: CRITICAL