Apache 2.4.x < 2.4.41 Multiple Vulnerabilities

critical Web App Scanning Plugin ID 98669

Synopsis

Apache 2.4.x < 2.4.41 Multiple Vulnerabilities

Description

According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.41. It is, therefore, affected by multiple vulnerabilities:

- A cross-site scripting (XSS) vulnerability exists in mod_proxy when proxying is enabled and Proxy Error page is displayed. (CVE-2019-10092)

- An open redirect vulnerability exists in mod_rewrite when using self-referential redirects. (CVE-2019-10098)

- A read-after-free vulnerability exists in mod_http2 during connection shutdown. (CVE-2019-10082)

- A memory corruption vulnerability exists in mod_http2 on early pushes. (CVE-2019-10081)

- A denial of service (DoS) vulnerability exists in mod_http2 by exhausting h2 workers. (CVE-2019-9517)

- A stack buffer overflow and NULL pointer dereference vulnerabilities exist in mod_remoteip when using a specially crafted PROXY header. (CVE-2019-10097)

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache version 2.4.41 or later.

See Also

https://archive.apache.org/dist/httpd/CHANGES_2.4.41

https://httpd.apache.org/security/vulnerabilities_24.html#2.4.41

Plugin Details

Severity: Critical

ID: 98669

Type: remote

Published: 8/20/2019

Updated: 3/14/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2019-9517

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

CVSS Score Source: CVE-2019-10082

Vulnerability Information

CPE: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/26/2019

Vulnerability Publication Date: 8/12/2019

Reference Information

CVE: CVE-2019-10081, CVE-2019-10082, CVE-2019-10092, CVE-2019-10097, CVE-2019-10098, CVE-2019-9517

CWE: 125, 400, 416, 476, 601, 770, 787, 79

OWASP: 2010-A10, 2010-A2, 2013-A10, 2013-A3, 2013-A9, 2017-A7, 2017-A9, 2021-A1, 2021-A3, 2021-A6, 2025-A1, 2025-A10, 2025-A5, 2025-A6

WASC: Buffer Overflow, Cross-Site Scripting, Denial of Service, URL Redirector Abuse

CAPEC: 125, 130, 147, 197, 209, 229, 230, 231, 469, 482, 486, 487, 488, 489, 490, 491, 492, 493, 494, 495, 496, 528, 540, 588, 591, 592, 63, 85

DISA STIG: APSC-DV-002400, APSC-DV-002490, APSC-DV-002560, APSC-DV-002590, APSC-DV-002630

HIPAA: 164.306(a)(1), 164.306(a)(2)

ISO: 27001-A.12.6.1, 27001-A.14.2.5

NIST: sp800_53-CM-6b, sp800_53-SC-5, sp800_53-SI-10, sp800_53-SI-16

OWASP API: 2019-API7, 2023-API8

OWASP ASVS: 4.0.2-14.2.1, 4.0.2-5.1.5, 4.0.2-5.3.3

PCI-DSS: 3.2-2.2, 3.2-6.2, 3.2-6.3, 3.2-6.4, 3.2-6.5, 3.2-6.5.1, 3.2-6.5.2, 3.2-6.5.7, 3.2-6.5.8, 3.2-6.6, 3.2-6.7