Lucene search

K
debianDebianDEBIAN:DLA-3401-1:6C841
HistoryApr 24, 2023 - 9:26 p.m.

[SECURITY] [DLA 3401-1] apache2 security update

2023-04-2421:26:18
lists.debian.org
9
apache2
update
http request smuggling
http response smuggling
fix
cve-2023-25690
cve-2023-27522
security
debian 10 buster

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.5%


Debian LTS Advisory DLA-3401-1 [email protected]
https://www.debian.org/lts/security/ Bastien Roucariès
April 24, 2023 https://wiki.debian.org/LTS


Package : apache2
Version : 2.4.38-3+deb10u10
CVE ID : CVE-2023-25690 CVE-2023-27522
Debian Bug : 1032476

Several vulnerabilities have been discovered in apache2,
a webserver that may be used as front-end proxy for other applications.
These vulnerabilities may lead to HTTP request smuggling, and thus
to front-end security controls being bypassed.

Unfortunately, fixing these security vulnerabilities may require
changes to configuration files. Some out-of-specification
RewriteRule directives that were previously silently accepted,
are now rejected with error AH10409. For instance, some RewriteRules
that included a back-reference and the flags "[L,NC]" will need to
be written with extra escaping flags such as "[B= ?,BNP,QSA]".

CVE-2023-25690

Some mod_proxy configurations allow an HTTP request Smuggling
attack. Configurations are affected when mod_proxy is
enabled along with some form of RewriteRule
or ProxyPassMatch in which a non-specific pattern matches
some portion of the user-supplied request-target (URL)
data and is then re-inserted into the proxied request-target
using variable substitution.

CVE-2023-27522

HTTP Response Smuggling in mod_proxy_uwsgi

For Debian 10 buster, these problems have been fixed in version
2.4.38-3+deb10u10.

We recommend that you upgrade your apache2 packages.

For the detailed security status of apache2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/apache2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.3 High

AI Score

Confidence

Low

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.019 Low

EPSS

Percentile

88.5%