Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2011-3639Improper Input Validation in Apache Http Server

Severity
4.3MEDIUMNVD
CNA5.0OSV5.0
EPSS
8.6%
top 7.56%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 30
Latest updateMay 14

Description

The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for C

CVSS vector

AV:N/AC:M/C:N/I:P/A:NExploitability: 8.6 | Impact: 2.9

Affected Packages1 packages

NVDapache/http_server67 versions+66

🔴Vulnerability Details

3
GHSA
GHSA-rqg3-pfxx-wwq3: The mod_proxy module in the Apache HTTP Server 22022-05-14
CVEList
CVE-2011-3639: The mod_proxy module in the Apache HTTP Server 22011-11-30
OSV
CVE-2011-3639: The mod_proxy module in the Apache HTTP Server 22011-11-30

💥Exploits & PoCs

1
Exploit-DB
Apache 2.2.15 mod_proxy - Reverse Proxy Security Bypass2012-02-06

📋Vendor Advisories

2
Red Hat
httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix2011-10-26
Debian
CVE-2011-3639: apache2 - The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x be...2011

💬Community

1
Bugzilla
CVE-2011-3639 httpd: http 0.9 request bypass of the reverse proxy vulnerability CVE-2011-3368 fix2011-11-08
CVE-2011-3639 — Improper Input Validation in Apache | cvebase