Severity
5.3MEDIUM
EPSS
12.4%
top 6.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 10
Latest updateMay 24

Description

Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages6 packages

NVDapache/http_server2.4.62.4.46
Debianapache2< 2.4.48-2+3
NVDoracle/instantis_enterprisetrack17.1, 17.2, 17.3+2

Also affects: Fedora 34, 35

🔴Vulnerability Details

3
GHSA
GHSA-qf63-wqjv-7x2f: Apache HTTP Server versions 22022-05-24
CVEList
mod_proxy_wstunnel tunneling of non Upgraded connections2021-06-10
OSV
CVE-2019-17567: Apache HTTP Server versions 22021-06-10

📋Vendor Advisories

3
Microsoft
mod_proxy_wstunnel tunneling of non Upgraded connections2021-06-08
Red Hat
httpd: mod_proxy_wstunnel tunneling of non Upgraded connection2021-06-04
Debian
CVE-2019-17567: apache2 - Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an ...2019
CVE-2019-17567 (MEDIUM CVSS 5.3) | Apache HTTP Server versions 2.4.6 t | cvebase.io