vulnerability
Apache HTTPD: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server 2.4.51 and earlier (CVE-2021-44224)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:N/I:P/A:P) | 12/20/2021 | 01/06/2022 | 12/09/2024 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:P)
Published
12/20/2021
Added
01/06/2022
Modified
12/09/2024
Description
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
Solution
apache-httpd-upgrade-latest
References
- URL-http://httpd.apache.org/security/vulnerabilities_24.html
- URL-http://seclists.org/fulldisclosure/2022/May/33
- URL-http://seclists.org/fulldisclosure/2022/May/35
- URL-http://seclists.org/fulldisclosure/2022/May/38
- URL-http://www.openwall.com/lists/oss-security/2021/12/20/3
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BFSWOH4X77CV7AH7C4RMHUBDWKQDL4YH/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/
- URL-https://security.gentoo.org/glsa/202208-20
- URL-https://security.netapp.com/advisory/ntap-20211224-0001/
- URL-https://support.apple.com/kb/HT213255
- URL-https://support.apple.com/kb/HT213256
- URL-https://support.apple.com/kb/HT213257
- URL-https://www.debian.org/security/2022/dsa-5035
- URL-https://www.oracle.com/security-alerts/cpuapr2022.html
- URL-https://www.oracle.com/security-alerts/cpujan2022.html
- URL-https://www.tenable.com/security/tns-2022-01
- URL-https://www.tenable.com/security/tns-2022-03
- CVE-2021-44224
- https://attackerkb.com/topics/CVE-2021-44224

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.