Apache Http Server vulnerabilities

299 known vulnerabilities affecting apache/http_server.

Total CVEs
299
CISA KEV
5
actively exploited
Public exploits
66
Exploited in wild
7
Severity breakdown
CRITICAL33HIGH95MEDIUM158LOW13

Vulnerabilities

Page 6 of 15
CVE-2017-9798HIGHCVSS 7.5PoC≤ 2.2.34v2.4.0+17 more2017-09-18
CVE-2017-9798 [HIGH] CWE-416 CVE-2017-9798: Apache httpd allows remote attackers to read secret data from process memory if the Limit directive Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting
nvd
CVE-2016-8743HIGHCVSS 7.5≥ 2.2.0, ≤ 2.2.31≥ 2.4.1, ≤ 2.4.232017-07-27
CVE-2016-8743 [HIGH] CVE-2016-8743: Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accept Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventio
nvd
CVE-2016-0736HIGHCVSS 7.5PoCv2.4.0v2.4.1+15 more2017-07-27
CVE-2016-0736 [HIGH] CWE-310 CVE-2016-0736: In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie us In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
nvd
CVE-2016-2161HIGHCVSS 7.5v2.4.0v2.4.1+15 more2017-07-27
CVE-2016-2161 [HIGH] CWE-823 CVE-2016-2161: In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the ser In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
nvd
CVE-2017-7659HIGHCVSS 7.5v2.4.24v2.4.252017-07-26
CVE-2017-7659 [HIGH] CWE-476 CVE-2017-7659: A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
nvd
CVE-2017-9788CRITICALCVSS 9.1≤ 2.2.33≥ 2.4.0, ≤ 2.4.262017-07-13
CVE-2017-9788 [CRITICAL] CWE-20 CVE-2017-9788: In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorizatio In Apache httpd before 2.2.34 and 2.4.x before 2.4.27, the value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior
nvd
CVE-2017-9789HIGHCVSS 7.5v2.4.262017-07-13
CVE-2017-9789 [HIGH] CWE-416 CVE-2017-9789: When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would s When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.
nvd
CVE-2017-3167CRITICALCVSS 9.8≥ 2.2.0, < 2.2.33≥ 2.4.0, < 2.4.262017-06-20
CVE-2017-3167 [CRITICAL] CWE-287 CVE-2017-3167: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by th In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed.
nvd
CVE-2017-3169CRITICALCVSS 9.8v2.2.0v2.2.2+32 more2017-06-20
CVE-2017-3169 [CRITICAL] CWE-476 CVE-2017-3169: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
nvd
CVE-2017-7679CRITICALCVSS 9.8≥ 2.2.0, < 2.2.33≥ 2.4.0, < 2.4.262017-06-20
CVE-2017-7679 [CRITICAL] CWE-126 CVE-2017-7679: In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end In Apache httpd 2.2.x before 2.2.33 and 2.4.x before 2.4.26, mod_mime can read one byte past the end of a buffer when sending a malicious Content-Type response header.
nvd
CVE-2017-7668HIGHCVSS 7.5v2.2.32v2.4.24+1 more2017-06-20
CVE-2017-7668 [HIGH] CWE-126 CVE-2017-7668: The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token li The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
nvd
CVE-2016-8740HIGHCVSS 7.5PoCv2.4.17v2.4.18+5 more2016-12-05
CVE-2016-8740 [HIGH] CWE-20 CVE-2016-8740: The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configurati The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.
nvd
CVE-2016-5387HIGHCVSS 8.1≥ 2.2.0, ≤ 2.2.31≥ 2.4.1, ≤ 2.4.232016-07-19
CVE-2016-5387 [HIGH] CVE-2016-5387: The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka
nvd
CVE-2016-4979HIGHCVSS 7.5v2.4.18v2.4.19+1 more2016-07-06
CVE-2016-4979 [HIGH] CWE-284 CVE-2016-4979: The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not prope The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renego
nvd
CVE-2016-1546MEDIUMCVSS 5.9v2.4.17v2.4.182016-07-06
CVE-2016-1546 [MEDIUM] CWE-399 CVE-2016-1546: The Apache HTTP Server 2.4.17 and 2.4.18, when mod_http2 is enabled, does not limit the number of si The Apache HTTP Server 2.4.17 and 2.4.18, when mod_http2 is enabled, does not limit the number of simultaneous stream workers for a single HTTP/2 connection, which allows remote attackers to cause a denial of service (stream-processing outage) via modified flow-control windows.
nvd
CVE-2015-0253MEDIUMCVSS 5.0v2.4.122015-07-20
CVE-2015-0253 [MEDIUM] CVE-2015-0253: The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initia The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400
nvd
CVE-2015-3183MEDIUMCVSS 5.0≥ 2.2.0, < 2.2.31≥ 2.4.0, < 2.4.162015-07-20
CVE-2015-3183 [MEDIUM] CWE-17 CVE-2015-3183: The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
nvd
CVE-2015-3185MEDIUMCVSS 4.3v2.4.0v2.4.1+10 more2015-07-20
CVE-2015-3185 [MEDIUM] CWE-264 CVE-2015-3185: The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the pres
nvd
CVE-2015-0228MEDIUMCVSS 5.0≤ 2.4.122015-03-08
CVE-2015-0228 [MEDIUM] CWE-20 CVE-2015-0228: The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server thr The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
nvd
CVE-2014-8109MEDIUMCVSS 4.3v2.4.1v2.4.2+6 more2014-12-29
CVE-2014-8109 [MEDIUM] CWE-863 CVE-2014-8109: mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not su mod_lua.c in the mod_lua module in the Apache HTTP Server 2.3.x and 2.4.x through 2.4.10 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging multi
nvd