TencentOS Server 3: httpd:2.4 (TSSA-2025:0816)

high Nessus Plugin ID 271123

Synopsis

The remote TencentOS Server 3 host is missing one or more security updates.

Description

The version of Tencent Linux installed on the remote TencentOS Server 3 host is prior to tested version. It is, therefore, affected by multiple vulnerabilities as referenced in the TSSA-2025:0816 advisory.

Package updates are available for TencentOS Server 3 that fix the following vulnerabilities:

CVE-2024-47252:
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations.

In a logging configuration where CustomLog is used with %{varname}x or %{varname}c to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.

CVE-2025-23048:
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption.

Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

CVE-2025-49630:
In certain proxy configurations, a denial of service attack againstApache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2.

Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to on.

CVE-2025-49812:
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade.

Only configurations using SSLEngine optional to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

Tenable has extracted the preceding description block directly from the Tencent Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://mirrors.tencent.com/tlinux/errata/tssa-20250816.xml

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-47252

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23048

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49630

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49812

Plugin Details

Severity: High

ID: 271123

File Name: tencentos_TSSA_2025_0816.nasl

Version: 1.1

Type: local

Published: 10/22/2025

Updated: 10/22/2025

Supported Sensors: Nessus

Vulnerability Information

CPE: p-cpe:/a:tencent:tencentos_server:httpd, cpe:/o:tencent:tencentos_server:3, p-cpe:/a:tencent:tencentos_server:mod_md, p-cpe:/a:tencent:tencentos_server:mod_http2

Required KB Items: Host/local_checks_enabled, Host/etc/os-release, Host/TencentOS/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 9/3/2025

Vulnerability Publication Date: 9/3/2025