Linux Security
    Linux Security
    Linux Security

    ArchLinux: 202004-14: apache: multiple issues

    Date
    233
    Posted By

    The package apache before version 2.4.43-1 is vulnerable to multiple issues including information disclosure and open redirect.

    Arch Linux Security Advisory ASA-202004-14
    ==========================================
    
    Severity: Low
    Date    : 2020-04-15
    CVE-ID  : CVE-2020-1927 CVE-2020-1934
    Package : apache
    Type    : multiple issues
    Remote  : Yes
    Link    : https://security.archlinux.org/AVG-1126
    
    Summary
    =======
    
    The package apache before version 2.4.43-1 is vulnerable to multiple
    issues including information disclosure and open redirect.
    
    Resolution
    ==========
    
    Upgrade to 2.4.43-1.
    
    # pacman -Syu "apache>=2.4.43-1"
    
    The problems have been fixed upstream in version 2.4.43.
    
    Workaround
    ==========
    
    None.
    
    Description
    ===========
    
    - CVE-2020-1927 (open redirect)
    
    A security issue has been found in Apache HTTP Server from 2.4.0 up to
    and including 2.4.41, in the mod_rewrite module, where redirects that
    were intended to be self-referential might be fooled by encoded
    newlines and redirect instead to an an unexpected URL within the
    request URL.
    This is the same defect as CVE-2019-10098. The fix for CVE-2019-10098
    was ineffective.
    Possible mitigations are the use of anchor captures as back-references,
    or prefixing self-referential redirects with / or scheme, host, and
    port.
    
    - CVE-2020-1934 (information disclosure)
    
    The use of an uninitialized value has been found in Apache HTTP Server
    from 2.4.0 up to and including 2.4.41, in the mod_proxy_ftp module,
    when proxying to a malicious FTP server.
    
    Impact
    ======
    
    A remote attacker is able to cause a redirect via a crafted HTTP
    request, or disclose information when proxying to an FTP server.
    
    References
    ==========
    
    https://httpd.apache.org/security/vulnerabilities_24.html
    https://seclists.org/oss-sec/2020/q2/3
    https://seclists.org/oss-sec/2020/q2/4
    https://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_ftp.c?r1=1873745&r2=1873744&pathrev=1873745
    https://security.archlinux.org/CVE-2020-1927
    https://security.archlinux.org/CVE-2020-1934
    
    

    LinuxSecurity Poll

    Which aspect of server security are you most interested in learning more about?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/38-which-aspect-of-server-security-are-you-most-interested-in-learning-more-about?task=poll.vote&format=json
    38
    radio
    [{"id":"131","title":"Preventing information leakage","votes":"1","type":"x","order":"1","pct":100,"resources":[]},{"id":"132","title":"Firewall considerations","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"133","title":"Permissions ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.