Severity
5.3MEDIUM
EPSS
0.6%
top 30.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 9
Latest updateJun 23

Description

The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages4 packages

NVDapache/http_server2.4.53
CVEListV5apache_software_foundation/apache_http_serverunspecified2.4.53
Debianapache2< 2.4.54-1~deb11u1+3
Ubuntuapache2< 2.4.29-1ubuntu4.24+4

Also affects: Fedora 35, 36

🔴Vulnerability Details

5
OSV
apache2 regression2022-06-23
OSV
apache2 vulnerabilities2022-06-21
GHSA
GHSA-r4hp-h998-37fc: The ap_rwrite() function in Apache HTTP Server 22022-06-10
OSV
CVE-2022-28614: The ap_rwrite() function in Apache HTTP Server 22022-06-09
CVEList
read beyond bounds via ap_rwrite()2022-06-08

📋Vendor Advisories

4
Ubuntu
Apache HTTP Server regression2022-06-23
Ubuntu
Apache HTTP Server vulnerabilities2022-06-21
Red Hat
httpd: Out-of-bounds read via ap_rwrite()2022-06-08
Debian
CVE-2022-28614: apache2 - The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unint...2022
CVE-2022-28614 (MEDIUM CVSS 5.3) | The ap_rwrite() function in Apache | cvebase.io