Koustav,

Am 2022-07-19 11:49, schrieb Naha, Koustav:
Hi,


We have the below vulnerability in recent scan, mentioned below.



Environment details:

Apache - 2.4.25 version

Tomcat - 8.5.5 version



given the age of the versions I guess you only have the option to update to the latest versions.

How did you install those? If they come from the package list of your OS, do the update from there.
But Tomcat can be easily installed from tar or zip.
You should review changes in config from 8.5.5 to 8.5.6x. In the long time things may have changed a bit, though not severly. For Apache httpd that may be different and you should check on their mailing list.


Can anyone take a look at the CVEs associated with the scan findings
and see if there are workarounds, rather than upgrading.


There aren't any workarounds that cover ALL of the vulnerabilities. Plus it seems less costly to upgrade instead of review each and every CVE.

My 2cts

Peter

CVE-2022-26377<https://www.shodan.io/search?query=vuln%3ACVE-2022-26377>
Inconsistent Interpretation of HTTP Requests ('HTTP Request
Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server
allows an attacker to smuggle requests to the AJP server it forwards
requests to. This issue affects Apache HTTP Server Apache HTTP Server
2.4 version 2.4.53 and prior versions.
CVE-2017-7679<https://www.shodan.io/search?query=vuln%3ACVE-2017-7679>
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime
can read one byte past the end of a buffer when sending a malicious
Content-Type response header.
CVE-2022-0778<https://www.shodan.io/search?query=vuln%3ACVE-2022-0778>
The BN_mod_sqrt() function, which computes a modular square root,
contains a bug that can cause it to loop forever for non-prime moduli.
Internally this function is used when parsing certificates that
contain elliptic curve public keys in compressed form or explicit
elliptic curve parameters with a base point encoded in compressed
form. It is possible to trigger the infinite loop by crafting a
certificate that has invalid explicit curve parameters. Since
certificate parsing happens prior to verification of the certificate
signature, any process that parses an externally supplied certificate
may thus be subject to a denial of service attack. The infinite loop
can also be reached when parsing crafted private keys as they can
contain explicit elliptic curve parameters. Thus vulnerable situations
include: - TLS clients consuming server certificates - TLS servers
consuming client certificates - Hosting providers taking certificates
or private keys from customers - Certificate authorities parsing
certification requests from subscribers - Anything else which parses
ASN.1 elliptic curve parameters Also any other applications that use
the BN_mod_sqrt() where the attacker can control the parameter values
are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the
public key is not parsed during initial parsing of the certificate
which makes it slightly harder to trigger the infinite loop. However
any operation which requires the public key from the certificate will
trigger the infinite loop. In particular the attacker can use a
self-signed certificate to trigger the loop during verification of the
certificate signature. This issue affects OpenSSL versions 1.0.2,
1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on
the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1).
Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL
1.0.2zd (Affected 1.0.2-1.0.2zc).
CVE-2020-1934<https://www.shodan.io/search?query=vuln%3ACVE-2020-1934>
In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use
uninitialized memory when proxying to a malicious FTP server.
CVE-2018-17189<https://www.shodan.io/search?query=vuln%3ACVE-2018-17189>
In Apache HTTP server versions 2.4.37 and prior, by sending request
bodies in a slow loris way to plain resources, the h2 stream for that
request unnecessarily occupied a server thread cleaning up that
incoming data. This affects only HTTP/2 (mod_http2) connections.
CVE-2017-9798<https://www.shodan.io/search?query=vuln%3ACVE-2017-9798>
Apache httpd allows remote attackers to read secret data from process
memory if the Limit directive can be set in a user's .htaccess file,
or if httpd.conf has certain misconfigurations, aka Optionsbleed. This
affects the Apache HTTP Server through 2.2.34 and 2.4.x through
2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request
when attempting to read secret data. This is a use-after-free issue
and thus secret data is not always sent, and the specific data depends
on many factors including configuration. Exploitation with .htaccess
can be blocked with a patch to the ap_limit_section function in
server/core.c.
CVE-2019-10082<https://www.shodan.io/search?query=vuln%3ACVE-2019-10082>
In Apache HTTP Server 2.4.18-2.4.39, using fuzzed network input, the
http/2 session handling could be made to read memory after being
freed, during connection shutdown.
CVE-2022-29404<https://www.shodan.io/search?query=vuln%3ACVE-2022-29404>
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua
script that calls r:parsebody(0) may cause a denial of service due to
no default limit on possible input size.
CVE-2020-1971<https://www.shodan.io/search?query=vuln%3ACVE-2020-1971>
The X.509 GeneralName type is a generic type for representing
different types of names. One of those name types is known as
EDIPartyName. OpenSSL provides a function GENERAL_NAME_cmp which
compares different instances of a GENERAL_NAME to see if they are
equal or not. This function behaves incorrectly when both
GENERAL_NAMEs contain an EDIPARTYNAME. A NULL pointer dereference and
a crash may occur leading to a possible denial of service attack.
OpenSSL itself uses the GENERAL_NAME_cmp function for two purposes: 1)
Comparing CRL distribution point names between an available CRL and a
CRL distribution point embedded in an X509 certificate 2) When
verifying that a timestamp response token signer matches the timestamp
authority name (exposed via the API functions TS_RESP_verify_response
and TS_RESP_verify_token) If an attacker can control both items being
compared then that attacker could trigger a crash. For example if the
attacker can trick a client or server into checking a malicious
certificate against a malicious CRL then this may occur. Note that
some applications automatically download CRLs based on a URL embedded
in a certificate. This checking happens prior to the signatures on the
certificate and CRL being verified. OpenSSL's s_server, s_client and
verify tools have support for the "-crl_download" option which
implements automatic CRL downloading and this attack has been
demonstrated to work against those tools. Note that an unrelated bug
means that affected versions of OpenSSL cannot parse or construct
correct encodings of EDIPARTYNAME. However it is possible to construct
a malformed EDIPARTYNAME that OpenSSL's parser will accept and hence
trigger this attack. All OpenSSL 1.1.1 and 1.0.2 versions are affected
by this issue. Other OpenSSL releases are out of support and have not
been checked. Fixed in OpenSSL 1.1.1i (Affected 1.1.1-1.1.1h). Fixed
in OpenSSL 1.0.2x (Affected 1.0.2-1.0.2w).
CVE-2018-1333<https://www.shodan.io/search?query=vuln%3ACVE-2018-1333>
By specially crafting HTTP/2 requests, workers would be allocated 60
seconds longer than necessary, leading to worker exhaustion and a
denial of service. Fixed in Apache HTTP Server 2.4.34 (Affected
2.4.18-2.4.30,2.4.33).
CVE-2019-0211<https://www.shodan.io/search?query=vuln%3ACVE-2019-0211>
In Apache HTTP Server 2.4 releases 2.4.17 to 2.4.38, with MPM event,
worker or prefork, code executing in less-privileged child processes
or threads (including scripts executed by an in-process scripting
interpreter) could execute arbitrary code with the privileges of the
parent process (usually root) by manipulating the scoreboard. Non-Unix
systems are not affected.
CVE-2018-5407<https://www.shodan.io/search?query=vuln%3ACVE-2018-5407>
Simultaneous Multi-threading (SMT) in processors can enable local
users to exploit software vulnerable to timing attacks via a
side-channel timing attack on 'port contention'.
CVE-2018-11763<https://www.shodan.io/search?query=vuln%3ACVE-2018-11763>
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large
SETTINGS frames a client can occupy a connection, server thread and
CPU time without any connection timeout coming to effect. This affects
only HTTP/2 connections. A possible mitigation is to not enable the h2
protocol.
CVE-2022-28330<https://www.shodan.io/search?query=vuln%3ACVE-2022-28330>
Apache HTTP Server 2.4.53 and earlier on Windows may read beyond
bounds when configured to process requests with the mod_isapi module.
CVE-2020-11993<https://www.shodan.io/search?query=vuln%3ACVE-2020-11993>
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was
enabled for the HTTP/2 module and on certain traffic edge patterns,
logging statements were made on the wrong connection, causing
concurrent use of memory pools. Configuring the LogLevel of mod_http2
above "info" will mitigate this vulnerability for unpatched servers.
CVE-2019-10092<https://www.shodan.io/search?query=vuln%3ACVE-2019-10092>
In Apache HTTP Server 2.4.0-2.4.39, a limited cross-site scripting
issue was reported affecting the mod_proxy error page. An attacker
could cause the link on the error page to be malformed and instead
point to a page of their choice. This would only be exploitable where
a server was set up with proxying enabled but was misconfigured in
such a way that the Proxy Error page was displayed.
CVE-2017-3736<https://www.shodan.io/search?query=vuln%3ACVE-2017-3736>
There is a carry propagating bug in the x86_64 Montgomery squaring
procedure in OpenSSL before 1.0.2m and 1.1.0 before 1.1.0g. No EC
algorithms are affected. Analysis suggests that attacks against RSA
and DSA as a result of this defect would be very difficult to perform
and are not believed likely. Attacks against DH are considered just
feasible (although very difficult) because most of the work necessary
to deduce information about a private key may be performed offline.
The amount of resources required for such an attack would be very
significant and likely only accessible to a limited number of
attackers. An attacker would additionally need online access to an
unpatched system using the target private key in a scenario with
persistent DH parameters and a private key that is shared between
multiple clients. This only affects processors that support the BMI1,
BMI2 and ADX extensions like Intel Broadwell (5th generation) and
later or AMD Ryzen.
CVE-2017-3737<https://www.shodan.io/search?query=vuln%3ACVE-2017-3737>
OpenSSL 1.0.2 (starting from version 1.0.2b) introduced an "error
state" mechanism. The intent was that if a fatal error occurred during
a handshake then OpenSSL would move into the error state and would
immediately fail if you attempted to continue the handshake. This
works as designed for the explicit handshake functions
(SSL_do_handshake(), SSL_accept() and SSL_connect()), however due to a
bug it does not work correctly if SSL_read() or SSL_write() is called
directly. In that scenario, if the handshake fails then a fatal error
will be returned in the initial function call. If
SSL_read()/SSL_write() is subsequently called by the application for
the same SSL object then it will succeed and the data is passed
without being decrypted/encrypted directly from the SSL/TLS record
layer. In order to exploit this issue an application bug would have to
be present that resulted in a call to SSL_read()/SSL_write() being
issued after having already received a fatal error. OpenSSL version
1.0.2b-1.0.2m are affected. Fixed in OpenSSL 1.0.2n. OpenSSL 1.1.0 is
not affected.
CVE-2019-1547<https://www.shodan.io/search?query=vuln%3ACVE-2019-1547>
Normally in OpenSSL EC groups always have a co-factor present and this
is used in side channel resistant code paths. However, in some cases,
it is possible to construct a group using explicit parameters (instead
of using a named curve). In those cases it is possible that such a
group does not have the cofactor present. This can occur even where
all the parameters match a known named curve. If such a curve is used
then OpenSSL falls back to non-side channel resistant code paths which
may result in full key recovery during an ECDSA signature operation.
In order to be vulnerable an attacker would have to have the ability
to time the creation of a large number of signatures where explicit
parameters with no co-factor present are in use by an application
using libcrypto. For the avoidance of doubt libssl is not vulnerable
because explicit parameters are never used. Fixed in OpenSSL 1.1.1d
(Affected 1.1.1-1.1.1c). Fixed in OpenSSL 1.1.0l (Affected
1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2017-3735<https://www.shodan.io/search?query=vuln%3ACVE-2017-3735>
While parsing an IPAddressFamily extension in an X.509 certificate, it
is possible to do a one-byte overread. This would result in an
incorrect text display of the certificate. This bug has been present
since 2006 and is present in all versions of OpenSSL before 1.0.2m and
1.1.0g.
CVE-2022-1292<https://www.shodan.io/search?query=vuln%3ACVE-2022-1292>
The c_rehash script does not properly sanitise shell metacharacters to
prevent command injection. This script is distributed by some
operating systems in a manner where it is automatically executed. On
such operating systems, an attacker could execute arbitrary commands
with the privileges of the script. Use of the c_rehash script is
considered obsolete and should be replaced by the OpenSSL rehash
command line tool. Fixed in OpenSSL 3.0.3 (Affected
3.0.0,3.0.1,3.0.2). Fixed in OpenSSL 1.1.1o (Affected 1.1.1-1.1.1n).
Fixed in OpenSSL 1.0.2ze (Affected 1.0.2-1.0.2zd).
CVE-2017-3738<https://www.shodan.io/search?query=vuln%3ACVE-2017-3738>
There is an overflow bug in the AVX2 Montgomery multiplication
procedure used in exponentiation with 1024-bit moduli. No EC
algorithms are affected. Analysis suggests that attacks against RSA
and DSA as a result of this defect would be very difficult to perform
and are not believed likely. Attacks against DH1024 are considered
just feasible, because most of the work necessary to deduce
information about a private key may be performed offline. The amount
of resources required for such an attack would be significant.
However, for an attack on TLS to be meaningful, the server would have
to share the DH1024 private key among multiple clients, which is no
longer an option since CVE-2016-0701. This only affects processors
that support the AVX2 but not ADX extensions like Intel Haswell (4th
generation). Note: The impact from this issue is similar to
CVE-2017-3736, CVE-2017-3732 and CVE-2015-3193. OpenSSL version
1.0.2-1.0.2m and 1.1.0-1.1.0g are affected. Fixed in OpenSSL 1.0.2n.
Due to the low severity of this issue we are not issuing a new release
of OpenSSL 1.1.0 at this time. The fix will be included in OpenSSL
1.1.0h when it becomes available. The fix is also available in commit
e502cc86d in the OpenSSL git repository.
CVE-2019-0196<https://www.shodan.io/search?query=vuln%3ACVE-2019-0196>
A vulnerability was found in Apache HTTP Server 2.4.17 to 2.4.38.
Using fuzzed network input, the http/2 request handling could be made
to access freed memory in string comparison when determining the
method of a request and thus process the request incorrectly.
CVE-2019-0197<https://www.shodan.io/search?query=vuln%3ACVE-2019-0197>
A vulnerability was found in Apache HTTP Server 2.4.34 to 2.4.38. When
HTTP/2 was enabled for a http: host or H2Upgrade was enabled for h2 on
a https: host, an Upgrade request from http/1.1 to http/2 that was not
the first request on a connection could lead to a misconfiguration and
crash. Server that never enabled the h2 protocol or that only enabled
it for https: and did not set "H2Upgrade on" are unaffected by this
issue.
CVE-2022-22721<https://www.shodan.io/search?query=vuln%3ACVE-2022-22721>
If LimitXMLRequestBody is set to allow request bodies larger than
350MB (defaults to 1M) on 32 bit systems an integer overflow happens
which later causes out of bounds writes. This issue affects Apache
HTTP Server 2.4.52 and earlier.
CVE-2022-22720<https://www.shodan.io/search?query=vuln%3ACVE-2022-22720>
Apache HTTP Server 2.4.52 and earlier fails to close inbound
connection when errors are encountered discarding the request body,
exposing the server to HTTP Request Smuggling
CVE-2017-15710<https://www.shodan.io/search?query=vuln%3ACVE-2017-15710>
In Apache httpd 2.0.23 to 2.0.65, 2.2.0 to 2.2.34, and 2.4.0 to
2.4.29, mod_authnz_ldap, if configured with AuthLDAPCharsetConfig,
uses the Accept-Language header value to lookup the right charset
encoding when verifying the user's credentials. If the header value is
not present in the charset conversion table, a fallback mechanism is
used to truncate it to a two characters value to allow a quick retry
(for example, 'en-US' is truncated to 'en'). A header value of less
than two characters forces an out of bound write of one NUL byte to a
memory location that is not part of the string. In the worst case,
quite unlikely, the process would crash which could be used as a
Denial of Service attack. In the more likely case, this memory is
already reserved for future use and the issue has no effect at all.
CVE-2022-2068<https://www.shodan.io/search?query=vuln%3ACVE-2022-2068>
In addition to the c_rehash shell command injection identified in
CVE-2022-1292, further circumstances where the c_rehash script does
not properly sanitise shell metacharacters to prevent command
injection were found by code review. When the CVE-2022-1292 was fixed
it was not discovered that there are other places in the script where
the file names of certificates being hashed were possibly passed to a
command executed through the shell. This script is distributed by some
operating systems in a manner where it is automatically executed. On
such operating systems, an attacker could execute arbitrary commands
with the privileges of the script. Use of the c_rehash script is
considered obsolete and should be replaced by the OpenSSL rehash
command line tool. Fixed in OpenSSL 3.0.4 (Affected
3.0.0,3.0.1,3.0.2,3.0.3). Fixed in OpenSSL 1.1.1p (Affected
1.1.1-1.1.1o). Fixed in OpenSSL 1.0.2zf (Affected 1.0.2-1.0.2ze).
CVE-2021-3712<https://www.shodan.io/search?query=vuln%3ACVE-2021-3712>
ASN.1 strings are represented internally within OpenSSL as an
ASN1_STRING structure which contains a buffer holding the string data
and a field holding the buffer length. This contrasts with normal C
strings which are repesented as a buffer for the string data which is
terminated with a NUL (0) byte. Although not a strict requirement,
ASN.1 strings that are parsed using OpenSSL's own "d2i" functions (and
other similar parsing functions) as well as any string whose value has
been set with the ASN1_STRING_set() function will additionally NUL
terminate the byte array in the ASN1_STRING structure. However, it is
possible for applications to directly construct valid ASN1_STRING
structures which do not NUL terminate the byte array by directly
setting the "data" and "length" fields in the ASN1_STRING array. This
can also happen by using the ASN1_STRING_set0() function. Numerous
OpenSSL functions that print ASN.1 data have been found to assume that
the ASN1_STRING byte array will be NUL terminated, even though this is
not guaranteed for strings that have been directly constructed. Where
an application requests an ASN.1 structure to be printed, and where
that ASN.1 structure contains ASN1_STRINGs that have been directly
constructed by the application without NUL terminating the "data"
field, then a read buffer overrun can occur. The same thing can also
occur during name constraints processing of certificates (for example
if a certificate has been directly constructed by the application
instead of loading it via the OpenSSL parsing functions, and the
certificate contains non NUL terminated ASN1_STRING structures). It
can also occur in the X509_get1_email(), X509_REQ_get1_email() and
X509_get1_ocsp() functions. If a malicious actor can cause an
application to directly construct an ASN1_STRING and then process it
through one of the affected OpenSSL functions then this issue could be
hit. This might result in a crash (causing a Denial of Service
attack). It could also result in the disclosure of private memory
contents (such as private keys, or sensitive plaintext). Fixed in
OpenSSL 1.1.1l (Affected 1.1.1-1.1.1k). Fixed in OpenSSL 1.0.2za
(Affected 1.0.2-1.0.2y).
CVE-2019-17567<https://www.shodan.io/search?query=vuln%3ACVE-2019-17567>
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel
configured on an URL that is not necessarily Upgraded by the origin
server was tunneling the whole connection regardless, thus allowing
for subsequent requests on the same connection to pass through with no
HTTP validation, authentication or authorization possibly configured.
CVE-2017-15715<https://www.shodan.io/search?query=vuln%3ACVE-2017-15715>
In Apache httpd 2.4.0 to 2.4.29, the expression specified in
<FilesMatch> could match '$' to a newline character in a malicious
filename, rather than matching only the end of the filename. This
could be exploited in environments where uploads of some files are are
externally blocked, but only by matching the trailing portion of the
filename.
CVE-2022-31813<https://www.shodan.io/search?query=vuln%3ACVE-2022-31813>
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-*
headers to the origin server based on client side Connection header
hop-by-hop mechanism. This may be used to bypass IP based
authentication on the origin server/application.
CVE-2017-7668<https://www.shodan.io/search?query=vuln%3ACVE-2017-7668>
The HTTP strict parsing changes added in Apache httpd 2.2.32 and
2.4.24 introduced a bug in token list parsing, which allows
ap_find_token() to search past the end of its input string. By
maliciously crafting a sequence of request headers, an attacker may be
able to cause a segmentation fault, or to force ap_find_token() to
return an incorrect value.
CVE-2019-10098<https://www.shodan.io/search?query=vuln%3ACVE-2019-10098>
In Apache HTTP server 2.4.0 to 2.4.39, Redirects configured with
mod_rewrite that were intended to be self-referential might be fooled
by encoded newlines and redirect instead to an unexpected URL within
the request URL.
CVE-2021-23840<https://www.shodan.io/search?query=vuln%3ACVE-2021-23840>
Calls to EVP_CipherUpdate, EVP_EncryptUpdate and EVP_DecryptUpdate may
overflow the output length argument in some cases where the input
length is close to the maximum permissable length for an integer on
the platform. In such cases the return value from the function call
will be 1 (indicating success), but the output length value will be
negative. This could cause applications to behave incorrectly or
crash. OpenSSL versions 1.1.1i and below are affected by this issue.
Users of these versions should upgrade to OpenSSL 1.1.1j. OpenSSL
versions 1.0.2x and below are affected by this issue. However OpenSSL
1.0.2 is out of support and no longer receiving public updates.
Premium support customers of OpenSSL 1.0.2 should upgrade to 1.0.2y.
Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j
(Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected
1.0.2-1.0.2x).
CVE-2021-40438<https://www.shodan.io/search?query=vuln%3ACVE-2021-40438>
A crafted request uri-path can cause mod_proxy to forward the request
to an origin server choosen by the remote user. This issue affects
Apache HTTP Server 2.4.48 and earlier.
CVE-2018-0737<https://www.shodan.io/search?query=vuln%3ACVE-2018-0737>
The OpenSSL RSA Key generation algorithm has been shown to be
vulnerable to a cache timing side channel attack. An attacker with
sufficient access to mount cache timing attacks during the RSA key
generation process could recover the private key. Fixed in OpenSSL
1.1.0i-dev (Affected 1.1.0-1.1.0h). Fixed in OpenSSL 1.0.2p-dev
(Affected 1.0.2b-1.0.2o).
CVE-2018-0734<https://www.shodan.io/search?query=vuln%3ACVE-2018-0734>
The OpenSSL DSA signature algorithm has been shown to be vulnerable to
a timing side channel attack. An attacker could use variations in the
signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a
(Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i).
Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
CVE-2018-0732<https://www.shodan.io/search?query=vuln%3ACVE-2018-0732>
During key agreement in a TLS handshake using a DH(E) based
ciphersuite a malicious server can send a very large prime value to
the client. This will cause the client to spend an unreasonably long
period of time generating a key for this prime resulting in a hang
until the client has finished. This could be exploited in a Denial Of
Service attack. Fixed in OpenSSL 1.1.0i-dev (Affected 1.1.0-1.1.0h).
Fixed in OpenSSL 1.0.2p-dev (Affected 1.0.2-1.0.2o).
CVE-2022-23943<https://www.shodan.io/search?query=vuln%3ACVE-2022-23943>
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server
allows an attacker to overwrite heap memory with possibly attacker
provided data. This issue affects Apache HTTP Server 2.4 version
2.4.52 and prior versions.
CVE-2020-1927<https://www.shodan.io/search?query=vuln%3ACVE-2020-1927>
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with
mod_rewrite that were intended to be self-referential might be fooled
by encoded newlines and redirect instead to an an unexpected URL
within the request URL.
CVE-2017-7659<https://www.shodan.io/search?query=vuln%3ACVE-2017-7659>
A maliciously constructed HTTP/2 request could cause mod_http2 in
Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and
crash the server process.
CVE-2018-17199<https://www.shodan.io/search?query=vuln%3ACVE-2018-17199>
In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks
the session expiry time before decoding the session. This causes
session expiry time to be ignored for mod_session_cookie sessions
since the expiry time is loaded when the session is decoded.
CVE-2021-23841<https://www.shodan.io/search?query=vuln%3ACVE-2021-23841>
The OpenSSL public API function X509_issuer_and_serial_hash() attempts
to create a unique hash value based on the issuer and serial number
data contained within an X509 certificate. However it fails to
correctly handle any errors that may occur while parsing the issuer
field (which might occur if the issuer field is maliciously
constructed). This may subsequently result in a NULL pointer deref and
a crash leading to a potential denial of service attack. The function
X509_issuer_and_serial_hash() is never directly called by OpenSSL
itself so applications are only vulnerable if they use this function
directly and they use it on certificates that may have been obtained
from untrusted sources. OpenSSL versions 1.1.1i and below are affected
by this issue. Users of these versions should upgrade to OpenSSL
1.1.1j. OpenSSL versions 1.0.2x and below are affected by this issue.
However OpenSSL 1.0.2 is out of support and no longer receiving public
updates. Premium support customers of OpenSSL 1.0.2 should upgrade to
1.0.2y. Other users should upgrade to 1.1.1j. Fixed in OpenSSL 1.1.1j
(Affected 1.1.1-1.1.1i). Fixed in OpenSSL 1.0.2y (Affected
1.0.2-1.0.2x).
CVE-2022-30522<https://www.shodan.io/search?query=vuln%3ACVE-2022-30522>
If Apache HTTP Server 2.4.53 is configured to do transformations with
mod_sed in contexts where the input to mod_sed may be very large,
mod_sed may make excessively large memory allocations and trigger an
abort.
CVE-2017-9788<https://www.shodan.io/search?query=vuln%3ACVE-2017-9788>
In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value
placeholder in [Proxy-]Authorization headers of type 'Digest' was not
initialized or reset before or between successive key=value
assignments by mod_auth_digest. Providing an initial key with no '='
assignment could reflect the stale value of uninitialized pool memory
used by the prior request, leading to leakage of potentially
confidential information, and a segfault in other cases resulting in
denial of service.
CVE-2018-0739<https://www.shodan.io/search?query=vuln%3ACVE-2018-0739>
Constructed ASN.1 types with a recursive definition (such as can be
found in PKCS7) could eventually exceed the stack given malicious
input with excessive recursion. This could result in a Denial Of
Service attack. There are no such structures used within SSL/TLS that
come from untrusted sources so this is considered safe. Fixed in
OpenSSL 1.1.0h (Affected 1.1.0-1.1.0g). Fixed in OpenSSL 1.0.2o
(Affected 1.0.2b-1.0.2n).
CVE-2018-1301<https://www.shodan.io/search?query=vuln%3ACVE-2018-1301>
A specially crafted request could have crashed the Apache HTTP Server
prior to version 2.4.30, due to an out of bound access after a size
limit is reached by reading the HTTP header. This vulnerability is
considered very hard if not impossible to trigger in non-debug mode
(both log and build level), so it is classified as low risk for common
server usage.
CVE-2018-1302<https://www.shodan.io/search?query=vuln%3ACVE-2018-1302>
When an HTTP/2 stream was destroyed after being handled, the Apache
HTTP Server prior to version 2.4.30 could have written a NULL pointer
potentially to an already freed memory. The memory pools maintained by
the server make this vulnerability hard to trigger in usual
configurations, the reporter and the team could not reproduce it
outside debug builds, so it is classified as low risk.
CVE-2018-1303<https://www.shodan.io/search?query=vuln%3ACVE-2018-1303>
A specially crafted HTTP request header could have crashed the Apache
HTTP Server prior to version 2.4.30 due to an out of bound read while
preparing data to be cached in shared memory. It could be used as a
Denial of Service attack against users of mod_cache_socache. The
vulnerability is considered as low risk since mod_cache_socache is not
widely used, mod_cache_disk is not concerned by this vulnerability.
CVE-2017-3167<https://www.shodan.io/search?query=vuln%3ACVE-2017-3167>
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of
the ap_get_basic_auth_pw() by third-party modules outside of the
authentication phase may lead to authentication requirements being
bypassed.
CVE-2021-34798<https://www.shodan.io/search?query=vuln%3ACVE-2021-34798>
Malformed requests may cause the server to dereference a NULL pointer.
This issue affects Apache HTTP Server 2.4.48 and earlier.
CVE-2019-1551<https://www.shodan.io/search?query=vuln%3ACVE-2019-1551>
There is an overflow bug in the x64_64 Montgomery squaring procedure
used in exponentiation with 512-bit moduli. No EC algorithms are
affected. Analysis suggests that attacks against 2-prime RSA1024,
3-prime RSA1536, and DSA1024 as a result of this defect would be very
difficult to perform and are not believed likely. Attacks against
DH512 are considered just feasible. However, for an attack the target
would have to re-use the DH512 private key, which is not recommended
anyway. Also applications directly using the low level API BN_mod_exp
may be affected if they use BN_FLG_CONSTTIME. Fixed in OpenSSL 1.1.1e
(Affected 1.1.1-1.1.1d). Fixed in OpenSSL 1.0.2u (Affected
1.0.2-1.0.2t).
CVE-2017-3169<https://www.shodan.io/search?query=vuln%3ACVE-2017-3169>
In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl
may dereference a NULL pointer when third-party modules call
ap_hook_process_connection() during an HTTP request to an HTTPS port.
CVE-2020-9490<https://www.shodan.io/search?query=vuln%3ACVE-2020-9490>
Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted
value for the 'Cache-Digest' header in a HTTP/2 request would result
in a crash when the server actually tries to HTTP/2 PUSH a resource
afterwards. Configuring the HTTP/2 feature via "H2Push off" will
mitigate this vulnerability for unpatched servers.
CVE-2022-22719<https://www.shodan.io/search?query=vuln%3ACVE-2022-22719>
A carefully crafted request body can cause a read to a random memory
area which could cause the process to crash. This issue affects Apache
HTTP Server 2.4.52 and earlier.
CVE-2019-1552<https://www.shodan.io/search?query=vuln%3ACVE-2019-1552>
OpenSSL has internal defaults for a directory tree where it can find a
configuration file as well as certificates used for verification in
TLS. This directory is most commonly referred to as OPENSSLDIR, and is
configurable with the --prefix / --openssldir configuration options.
For OpenSSL versions 1.1.0 and 1.1.1, the mingw configuration targets
assume that resulting programs and libraries are installed in a
Unix-like environment and the default prefix for program installation
as well as for OPENSSLDIR should be '/usr/local'. However, mingw
programs are Windows programs, and as such, find themselves looking at
sub-directories of 'C:/usr/local', which may be world writable, which
enables untrusted users to modify OpenSSL's default configuration,
insert CA certificates, modify (or even replace) existing engine
modules, etc. For OpenSSL 1.0.2, '/usr/local/ssl' is used as default
for OPENSSLDIR on all Unix and Windows targets, including Visual C
builds. However, some build instructions for the diverse Windows
targets on 1.0.2 encourage you to specify your own --prefix. OpenSSL
versions 1.1.1, 1.1.0 and 1.0.2 are affected by this issue. Due to the
limited scope of affected deployments this has been assessed as low
severity and therefore we are not creating new releases at this time.
Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c). Fixed in OpenSSL
1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL 1.0.2t (Affected
1.0.2-1.0.2s).
CVE-2021-44790<https://www.shodan.io/search?query=vuln%3ACVE-2021-44790>
A carefully crafted request body can cause a buffer overflow in the
mod_lua multipart parser (r:parsebody() called from Lua scripts). The
Apache httpd team is not aware of an exploit for the vulnerabilty
though it might be possible to craft one. This issue affects Apache
HTTP Server 2.4.51 and earlier.
CVE-2021-4160<https://www.shodan.io/search?query=vuln%3ACVE-2021-4160>
There is a carry propagation bug in the MIPS32 and MIPS64 squaring
procedure. Many EC algorithms are affected, including some of the TLS
1.3 default curves. Impact was not analyzed in detail, because the
pre-requisites for attack are considered unlikely and include reusing
private keys. Analysis suggests that attacks against RSA and DSA as a
result of this defect would be very difficult to perform and are not
believed likely. Attacks against DH are considered just feasible
(although very difficult) because most of the work necessary to deduce
information about a private key may be performed offline. The amount
of resources required for such an attack would be significant.
However, for an attack on TLS to be meaningful, the server would have
to share the DH private key among multiple clients, which is no longer
an option since CVE-2016-0701. This issue affects OpenSSL versions
1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and
3.0.1 on the 15th of December 2021. For the 1.0.2 release it is
addressed in git commit 6fc1aaaf3 that is available to premium support
customers only. It will be made available in 1.0.2zc when it is
released. The issue only affects OpenSSL on MIPS platforms. Fixed in
OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected
1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb).
CVE-2019-1559<https://www.shodan.io/search?query=vuln%3ACVE-2019-1559>
If an application encounters a fatal protocol error and then calls
SSL_shutdown() twice (once to send a close_notify, and once to receive
one) then OpenSSL can respond differently to the calling application
if a 0 byte record is received with invalid padding compared to if a 0
byte record is received with an invalid MAC. If the application then
behaves differently based on that in a way that is detectable to the
remote peer, then this amounts to a padding oracle that could be used
to decrypt data. In order for this to be exploitable "non-stitched"
ciphersuites must be in use. Stitched ciphersuites are optimised
implementations of certain commonly used ciphersuites. Also the
application must call SSL_shutdown() twice even if a protocol error
has occurred (applications should not do this but some do anyway).
Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
CVE-2021-26690<https://www.shodan.io/search?query=vuln%3ACVE-2021-26690>
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie
header handled by mod_session can cause a NULL pointer dereference and
crash, leading to a possible Denial Of Service
CVE-2021-26691<https://www.shodan.io/search?query=vuln%3ACVE-2021-26691>
In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted
SessionHeader sent by an origin server could cause a heap overflow
CVE-2019-0220<https://www.shodan.io/search?query=vuln%3ACVE-2019-0220>
A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When
the path component of a request URL contains multiple consecutive
slashes ('/'), directives such as LocationMatch and RewriteRule must
account for duplicates in regular expressions while other aspects of
the servers processing will implicitly collapse them.
CVE-2019-1563<https://www.shodan.io/search?query=vuln%3ACVE-2019-1563>
In situations where an attacker receives automated notification of the
success or failure of a decryption attempt an attacker, after sending
a very large number of messages to be decrypted, can recover a
CMS/PKCS7 transported encryption key or decrypt any RSA encrypted
message that was encrypted with the public RSA key, using a
Bleichenbacher padding oracle attack. Applications are not affected if
they use a certificate together with the private RSA key to the
CMS_decrypt or PKCS7_decrypt functions to select the correct recipient
info to decrypt. Fixed in OpenSSL 1.1.1d (Affected 1.1.1-1.1.1c).
Fixed in OpenSSL 1.1.0l (Affected 1.1.0-1.1.0k). Fixed in OpenSSL
1.0.2t (Affected 1.0.2-1.0.2s).
CVE-2020-35452<https://www.shodan.io/search?query=vuln%3ACVE-2020-35452>
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest
nonce can cause a stack overflow in mod_auth_digest. There is no
report of this overflow being exploitable, nor the Apache HTTP Server
team could create one, though some particular compiler and/or
compilation option might make it possible, with limited consequences
anyway due to the size (a single byte) and the value (zero byte) of
the overflow
CVE-2020-13938<https://www.shodan.io/search?query=vuln%3ACVE-2020-13938>
Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users
can stop httpd on Windows
CVE-2019-10081<https://www.shodan.io/search?query=vuln%3ACVE-2019-10081>
HTTP/2 (2.4.20 through 2.4.39) very early pushes, for example
configured with "H2PushResource", could lead to an overwrite of memory
in the pushing request's pool, leading to crashes. The memory copied
is that of the configured push link header values, not data supplied
by the client.
CVE-2018-1283<https://www.shodan.io/search?query=vuln%3ACVE-2018-1283>
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to
forward its session data to CGI applications (SessionEnv on, not the
default), a remote user may influence their content by using a
"Session" header. This comes from the "HTTP_SESSION" variable name
used by mod_session to forward its data to CGIs, since the prefix
"HTTP_" is also used by the Apache HTTP Server to pass HTTP header
fields, per CGI specifications.
CVE-2020-1968<https://www.shodan.io/search?query=vuln%3ACVE-2020-1968>
The Raccoon attack exploits a flaw in the TLS specification which can
lead to an attacker being able to compute the pre-master secret in
connections which have used a Diffie-Hellman (DH) based ciphersuite.
In such a case this would result in the attacker being able to
eavesdrop on all encrypted communications sent over that TLS
connection. The attack can only be exploited if an implementation
re-uses a DH secret across multiple TLS connections. Note that this
issue only impacts DH ciphersuites and not ECDH ciphersuites. This
issue affects OpenSSL 1.0.2 which is out of support and no longer
receiving public updates. OpenSSL 1.1.1 is not vulnerable to this
issue. Fixed in OpenSSL 1.0.2w (Affected 1.0.2-1.0.2v).
CVE-2022-30556<https://www.shodan.io/search?query=vuln%3ACVE-2022-30556>
Apache HTTP Server 2.4.53 and earlier may return lengths to
applications calling r:wsread() that point past the end of the storage
allocated for the buffer.
CVE-2021-44224<https://www.shodan.io/search?query=vuln%3ACVE-2021-44224>
A crafted URI sent to httpd configured as a forward proxy
(ProxyRequests on) can cause a crash (NULL pointer dereference) or,
for configurations mixing forward and reverse proxy declarations, can
allow for requests to be directed to a declared Unix Domain Socket
endpoint (Server Side Request Forgery). This issue affects Apache HTTP
Server 2.4.7 up to 2.4.51 (included).
CVE-2019-0217<https://www.shodan.io/search?query=vuln%3ACVE-2019-0217>
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition
in mod_auth_digest when running in a threaded server could allow a
user with valid credentials to authenticate using another username,
bypassing configured access control restrictions.
CVE-2021-39275<https://www.shodan.io/search?query=vuln%3ACVE-2021-39275>
ap_escape_quotes() may write beyond the end of a buffer when given
malicious input. No included modules pass untrusted data to these
functions, but third-party / external modules may. This issue affects
Apache HTTP Server 2.4.48 and earlier.
CVE-2022-28615<https://www.shodan.io/search?query=vuln%3ACVE-2022-28615>
Apache HTTP Server 2.4.53 and earlier may crash or disclose
information due to a read beyond bounds in ap_strcmp_match() when
provided with an extremely large input buffer. While no code
distributed with the server can be coerced into such a call,
third-party modules or lua scripts that use ap_strcmp_match() may
hypothetically be affected.
CVE-2022-28614<https://www.shodan.io/search?query=vuln%3ACVE-2022-28614>
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may
read unintended memory if an attacker can cause the server to reflect
very large input using ap_rwrite() or ap_rputs(), such as with
mod_luas r:puts() function. Modules compiled and distributed
separately from Apache HTTP Server that use the 'ap_rputs' function
and may pass it a very large (INT_MAX or larger) string must be
compiled against current headers to resolve the issue.
CVE-2018-1312<https://www.shodan.io/search?query=vuln%3ACVE-2018-1312>
In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest
authentication challenge, the nonce sent to prevent reply attacks was
not correctly generated using a pseudo-random seed. In a cluster of
servers using a common Digest authentication configuration, HTTP
requests could be replayed across servers by an attacker without
detection.



DXC Technology Company -- This message is transmitted to you by or on
behalf of DXC Technology Company or one of its affiliates. It is
intended exclusively for the addressee. The substance of this message,
along with any attachments, may contain proprietary, confidential or
privileged information or information that is otherwise legally exempt
from disclosure. Any unauthorized review, use, disclosure or
distribution is prohibited. If you are not the intended recipient of
this message, you are not authorized to read, print, retain, copy or
disseminate any part of this message. If you have received this
message in error, please destroy and delete all copies and notify the
sender by return e-mail. Regardless of content, this e-mail shall not
operate to bind DXC Technology Company or any of its affiliates to any
order or other contract unless pursuant to explicit written agreement
or government initiative expressly permitting the use of e-mail for
such purpose.


---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org

Reply via email to