Debian Apache2 vulnerabilities
242 known vulnerabilities affecting debian/apache2.
Total CVEs
242
CISA KEV
5
actively exploited
Public exploits
49
Exploited in wild
7
Severity breakdown
CRITICAL25HIGH66MEDIUM72LOW79
Vulnerabilities
Page 6 of 13
CVE-2017-15715HIGHCVSS 8.1ExploitedPoCfixed in apache2 2.4.33-1 (bookworm)2017
CVE-2017-15715 [HIGH] CVE-2017-15715: apache2 - In Apache httpd 2.4.0 to 2.4.29, the expression specified in <FilesMatch> could ...
In Apache httpd 2.4.0 to 2.4.29, the expression specified in could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
Scope: local
bookworm: resolved (fixe
debian
CVE-2017-9798HIGHCVSS 7.5PoCfixed in apache2 2.4.27-6 (bookworm)2017
CVE-2017-9798 [HIGH] CVE-2017-9798: apache2 - Apache httpd allows remote attackers to read secret data from process memory if ...
Apache httpd allows remote attackers to read secret data from process memory if the Limit directive can be set in a user's .htaccess file, or if httpd.conf has certain misconfigurations, aka Optionsbleed. This affects the Apache HTTP Server through 2.2.34 and 2.4.x through 2.4.27. The attacker sends an unauthenticated OPTIONS HTTP request when attempting to read secre
debian
CVE-2017-7668HIGHCVSS 7.5fixed in apache2 2.4.25-4 (bookworm)2017
CVE-2017-7668 [HIGH] CVE-2017-7668: apache2 - The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduc...
The HTTP strict parsing changes added in Apache httpd 2.2.32 and 2.4.24 introduced a bug in token list parsing, which allows ap_find_token() to search past the end of its input string. By maliciously crafting a sequence of request headers, an attacker may be able to cause a segmentation fault, or to force ap_find_token() to return an incorrect value.
Scope: local
book
debian
CVE-2017-7659HIGHCVSS 7.5fixed in apache2 2.4.25-4 (bookworm)2017
CVE-2017-7659 [HIGH] CVE-2017-7659: apache2 - A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Se...
A maliciously constructed HTTP/2 request could cause mod_http2 in Apache HTTP Server 2.4.24, 2.4.25 to dereference a NULL pointer and crash the server process.
Scope: local
bookworm: resolved (fixed in 2.4.25-4)
bullseye: resolved (fixed in 2.4.25-4)
forky: resolved (fixed in 2.4.25-4)
sid: resolved (fixed in 2.4.25-4)
trixie: resolved (fixed in 2.4.25-4)
debian
CVE-2017-12171LOWCVSS 6.52017
CVE-2017-12171 [MEDIUM] CVE-2017-12171: apache2 - A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2....
A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: reso
debian
CVE-2017-9789LOWCVSS 7.52017
CVE-2017-9789 [HIGH] CVE-2017-9789: apache2 - When under stress, closing many connections, the HTTP/2 handling code in Apache ...
When under stress, closing many connections, the HTTP/2 handling code in Apache httpd 2.4.26 would sometimes access memory after it has been freed, resulting in potentially erratic behaviour.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2016-2161HIGHCVSS 7.5fixed in apache2 2.4.25-1 (bookworm)2016
CVE-2016-2161 [HIGH] CVE-2016-2161: apache2 - In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_dige...
In Apache HTTP Server versions 2.4.0 to 2.4.23, malicious input to mod_auth_digest can cause the server to crash, and each instance continues to crash even for subsequently valid requests.
Scope: local
bookworm: resolved (fixed in 2.4.25-1)
bullseye: resolved (fixed in 2.4.25-1)
forky: resolved (fixed in 2.4.25-1)
sid: resolved (fixed in 2.4.25-1)
trixie: resolved (fi
debian
CVE-2016-0736HIGHCVSS 7.5PoCfixed in apache2 2.4.25-1 (bookworm)2016
CVE-2016-0736 [HIGH] CVE-2016-0736: apache2 - In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encryptin...
In Apache HTTP Server versions 2.4.0 to 2.4.23, mod_session_crypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC.
Scope: local
bookworm: resolved (fix
debian
CVE-2016-5387HIGHCVSS 8.1fixed in apache2 2.4.23-2 (bookworm)2016
CVE-2016-5387 [HIGH] CVE-2016-5387: apache2 - The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and theref...
The Apache HTTP Server through 2.4.23 follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "htt
debian
CVE-2016-8740HIGHCVSS 7.5PoCfixed in apache2 2.4.25-1 (bookworm)2016
CVE-2016-8740 [HIGH] CVE-2016-8740: apache2 - The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the P...
The mod_http2 module in the Apache HTTP Server 2.4.17 through 2.4.23, when the Protocols configuration includes h2 or h2c, does not restrict request-header length, which allows remote attackers to cause a denial of service (memory consumption) via crafted CONTINUATION frames in an HTTP/2 request.
Scope: local
bookworm: resolved (fixed in 2.4.25-1)
bullseye: resolved (
debian
CVE-2016-8743HIGHCVSS 7.5fixed in apache2 2.4.25-1 (bookworm)2016
CVE-2016-8743 [HIGH] CVE-2016-8743: apache2 - Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in t...
Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI
debian
CVE-2016-4979HIGHCVSS 7.5fixed in apache2 2.4.23-1 (bookworm)2016
CVE-2016-4979 [HIGH] CVE-2016-4979: apache2 - The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are ena...
The Apache HTTP Server 2.4.18 through 2.4.20, when mod_http2 and mod_ssl are enabled, does not properly recognize the "SSLVerifyClient require" directive for HTTP/2 request authorization, which allows remote attackers to bypass intended access restrictions by leveraging the ability to send multiple requests over a single connection and aborting a renegotiation.
Scope:
debian
CVE-2016-1546MEDIUMCVSS 5.9fixed in apache2 2.4.20-1 (bookworm)2016
CVE-2016-1546 [MEDIUM] CVE-2016-1546: apache2 - The Apache HTTP Server 2.4.17 and 2.4.18, when mod_http2 is enabled, does not li...
The Apache HTTP Server 2.4.17 and 2.4.18, when mod_http2 is enabled, does not limit the number of simultaneous stream workers for a single HTTP/2 connection, which allows remote attackers to cause a denial of service (stream-processing outage) via modified flow-control windows.
Scope: local
bookworm: resolved (fixed in 2.4.20-1)
bullseye: resolved (fixed in 2.4.20-1
debian
CVE-2016-4975LOWCVSS 6.1PoCfixed in apache2 2.4.25-1 (bookworm)2016
CVE-2016-4975 [MEDIUM] CVE-2016-4975: apache2 - Possible CRLF injection allowing HTTP response splitting attacks for sites which...
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value. Fixed in Apache HTTP Server 2.4.25 (Affected 2.4.1-2.4.23). Fixed in Apache HTTP Server 2.2.32 (Affected 2.2.0-2.2.
debian
CVE-2015-3185MEDIUMCVSS 4.3fixed in apache2 2.4.16-1 (bookworm)2015
CVE-2015-3185 [MEDIUM] CVE-2015-3185: apache2 - The ap_some_auth_required function in server/request.c in the Apache HTTP Server...
The ap_some_auth_required function in server/request.c in the Apache HTTP Server 2.4.x before 2.4.14 does not consider that a Require directive may be associated with an authorization setting rather than an authentication setting, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging the presence of a modul
debian
CVE-2015-3183MEDIUMCVSS 5.0fixed in apache2 2.4.16-1 (bookworm)2015
CVE-2015-3183 [MEDIUM] CVE-2015-3183: apache2 - The chunked transfer coding implementation in the Apache HTTP Server before 2.4....
The chunked transfer coding implementation in the Apache HTTP Server before 2.4.14 does not properly parse chunk headers, which allows remote attackers to conduct HTTP request smuggling attacks via a crafted request, related to mishandling of large chunk-size values and invalid chunk-extension characters in modules/http/http_filters.c.
Scope: local
bookworm: resolve
debian
CVE-2015-3675LOWCVSS 5.02015
CVE-2015-3675 [MEDIUM] CVE-2015-3675: apache2 - The default configuration of the Apache HTTP Server on Apple OS X before 10.10.4...
The default configuration of the Apache HTTP Server on Apple OS X before 10.10.4 does not enable the mod_hfs_apple module, which allows remote attackers to bypass HTTP authentication via a crafted URL.
Scope: local
bookworm: resolved
bullseye: resolved
forky: resolved
sid: resolved
trixie: resolved
debian
CVE-2015-0253LOWCVSS 5.02015
CVE-2015-0253 [MEDIUM] CVE-2015-0253: apache2 - The read_request_line function in server/protocol.c in the Apache HTTP Server 2....
The read_request_line function in server/protocol.c in the Apache HTTP Server 2.4.12 does not initialize the protocol structure member, which allows remote attackers to cause a denial of service (NULL pointer dereference and process crash) by sending a request that lacks a method to an installation that enables the INCLUDES filter and has an ErrorDocument 400 direct
debian
CVE-2015-0228LOWCVSS 5.0fixed in apache2 2.4.10-10 (bookworm)2015
CVE-2015-0228 [MEDIUM] CVE-2015-0228: apache2 - The lua_websocket_read function in lua_request.c in the mod_lua module in the Ap...
The lua_websocket_read function in lua_request.c in the mod_lua module in the Apache HTTP Server through 2.4.12 allows remote attackers to cause a denial of service (child-process crash) by sending a crafted WebSocket Ping frame after a Lua script has called the wsupgrade function.
Scope: local
bookworm: resolved (fixed in 2.4.10-10)
bullseye: resolved (fixed in 2.4
debian
CVE-2014-0117MEDIUMCVSS 4.3fixed in apache2 2.4.10-1 (bookworm)2014
CVE-2014-0117 [MEDIUM] CVE-2014-0117: apache2 - The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a rever...
The mod_proxy module in the Apache HTTP Server 2.4.x before 2.4.10, when a reverse proxy is enabled, allows remote attackers to cause a denial of service (child-process crash) via a crafted HTTP Connection header.
Scope: local
bookworm: resolved (fixed in 2.4.10-1)
bullseye: resolved (fixed in 2.4.10-1)
forky: resolved (fixed in 2.4.10-1)
sid: resolved (fixed in 2.4
debian