CVE-2019-17567
Publication date 10 June 2021
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
Status
Package | Ubuntu Release | Status |
---|---|---|
apache2 | 24.10 oracular |
Not affected
|
24.04 LTS noble |
Not affected
|
|
22.04 LTS jammy |
Not affected
|
|
20.04 LTS focal |
Vulnerable, fix deferred
|
|
18.04 LTS bionic |
Vulnerable, fix deferred
|
|
16.04 LTS xenial |
Vulnerable, fix deferred
|
|
14.04 LTS trusty |
Vulnerable, fix deferred
|
Notes
mdeslaur
The patches required to fix this in stable releases are quite intrusive and change behaviour. It may not make sense to backport them to stable releases.
Patch details
Package | Patch details |
---|---|
apache2 |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 5.3 · Medium |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | None |
Integrity impact | Low |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
References
Other references
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
- https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
- http://www.openwall.com/lists/oss-security/2021/06/10/2
- https://www.cve.org/CVERecord?id=CVE-2019-17567