Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.114144
Kategorie:Web Servers
Titel:Apache HTTP Server 2.4.0 - 2.4.40 Multiple Vulnerabilities - Windows
Zusammenfassung:Apache HTTP Server is prone to multiple vulnerabilities.
Beschreibung:Summary:
Apache HTTP Server is prone to multiple vulnerabilities.

Vulnerability Insight:
Apache HTTP server is prone to multiple vulnerabilities:

- A limited cross-site scripting issue affecting the mod_proxy error page. An attacker
could cause the link on the error page to be malformed and instead point to a page of
their choice. This would be exploitable where a server was set up with proxying enabled
but was misconfigured in such a way that the Proxy Error page was displayed. (CVE-2019-10092)

- Redirects configured with mod_rewrite that were intended to be self referential
might be fooled by encoded newlines and redirect instead to an unexpected URL within
the request URL. (CVE-2019-10098)

Affected Software/OS:
Apache HTTP Server version 2.4.0 to 2.4.40.

Solution:
Update to version 2.4.41 or later.

CVSS Score:
5.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2019-10092
Bugtraq: 20190826 [SECURITY] [DSA 4509-1] apache2 security update (Google Search)
https://seclists.org/bugtraq/2019/Aug/47
Bugtraq: 20191016 [SECURITY] [DSA 4509-3] apache2 security update (Google Search)
https://seclists.org/bugtraq/2019/Oct/24
Debian Security Information: DSA-4509 (Google Search)
https://www.debian.org/security/2019/dsa-4509
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7RVHJHTU4JN3ULCQ44F2G6LZBF2LGNTC/
https://security.gentoo.org/glsa/201909-04
https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-10092-Limited%20Cross-Site%20Scripting%20in%20mod_proxy%20Error%20Page-Apache%20httpd
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.oracle.com/security-alerts/cpuapr2020.html
https://www.oracle.com/security-alerts/cpujan2020.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
https://lists.debian.org/debian-lts-announce/2019/08/msg00034.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00034.html
https://lists.apache.org/thread.html/73768e31e0fcae03e12f5aa87da1cb26dece39327f3c32060baa3e94@%3Cannounce.httpd.apache.org%3E
https://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r03ee478b3dda3e381fd6189366fa7af97c980d2f602846eef935277d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rd2fb621142e7fa187cfe12d7137bf66e7234abcbbcd800074c84a538@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r0a83b112cd9701ef8a2061c8ed557f3dc9bb774d4da69fbb91bbc3c4@%3Cusers.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2019/08/15/4
http://www.openwall.com/lists/oss-security/2020/08/08/1
http://www.openwall.com/lists/oss-security/2020/08/08/9
RedHat Security Advisories: RHSA-2019:4126
https://access.redhat.com/errata/RHSA-2019:4126
SuSE Security Announcement: openSUSE-SU-2019:2051 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00004.html
https://usn.ubuntu.com/4113-1/
Common Vulnerability Exposure (CVE) ID: CVE-2019-10098
https://www.oracle.com/security-alerts/cpuApr2021.html
https://lists.apache.org/thread.html/r5d12ffc80685b0df1d6801e68000a7707dd694fe32e4f221de67c210@%3Ccvs.httpd.apache.org%3E
http://www.openwall.com/lists/oss-security/2020/04/01/4
CopyrightCopyright (C) 2019 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.