below are the vulnerabilities reported on Rocky linux 8 for apache http
CVE ID:
CVE-2023-25690
Kenna Status:
* open
Description:
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule â^/here/(.*)â http://example.com:8080/elsewhere?$1; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
CVE ID:
CVE-2024-38475
Kenna Status:
* open
Description:
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are?permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in?server context that use a backreferences or variables as the first segment of the substitution are affected.? Some unsafe RewiteRules will be broken by this change and the rewrite flag âUnsafePrefixStatâ can be used to opt back in once ensuring the substitution is appropriately constrained.
could you please let us know the procedure/steps to upgrade http to 2.4.62
* Thu Jul 11 2024 LuboĹĄ Uhliarik <luhliari@redhat.com> - 2.4.37-65.1
- Resolves: RHEL-45812 - httpd:2.4/httpd: Substitution encoding issue
in mod_rewrite (CVE-2024-38474)
- Resolves: RHEL-45785 - httpd:2.4/httpd: Encoding problem in
mod_proxy (CVE-2024-38473)
- Resolves: RHEL-45777 - httpd:2.4/httpd: Improper escaping of output
in mod_rewrite (CVE-2024-38475)
- Resolves: RHEL-45758 - httpd:2.4/httpd: null pointer dereference
in mod_proxy (CVE-2024-38477)
- Resolves: RHEL-45743 - httpd:2.4/httpd: Potential SSRF
in mod_rewrite (CVE-2024-39573)
CVE-2023-25690
Already fixed.
* Thu Apr 27 2023 LuboĹĄ Uhliarik <luhliari@redhat.com> - 2.4.37-56.5
- Resolves: #2190133 - mod_rewrite regression with CVE-2023-25690
* Sat Mar 18 2023 LuboĹĄ Uhliarik <luhliari@redhat.com> - 2.4.37-56.4
- Resolves: #2177748 - CVE-2023-25690 httpd:2.4/httpd: HTTP request splitting
with mod_rewrite and mod_proxy
These are already fixed. Please ensure you are running at least httpd-2.4.37-65.module+el8.10.0+1840+b070a976.1. Notify the vendor who makes this âvulnerability scannerâ that they are already fixed and security issues are backported.
Excellent!!! Thank you very much for the information. that means these are already fixed on our machine. no need to take any action on this right. please correct me i am wrong.
Below are the findings on our machine.
$ dnf list httpd
Last metadata expiration check: 0:03:38 ago on Fri 17 Jan 2025 10:22:23 AM UTC.
Installed Packages
httpd.x86_64 2.4.37-65.module+el8.10.0+1842+4a9649e8.2 @appstream