httpd:2.4 httpd-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1, mod_http2-1.15.7-5.module+el8+1598+5e93bbc9.4, mod_md-2.0.8-8.module+el8+1598+5e93bbc9
エラータID: AXSA:2023-5275:01
The httpd packages provide the Apache HTTP Server, a powerful, efficient, and extensible web server.
Security Fix(es):
* httpd: HTTP request splitting with mod_rewrite and mod_proxy (CVE-2023-25690)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
CVE-2023-25690
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
Modularity name: httpd
Stream name: 2.4
Update packages.
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
N/A
SRPMS
- httpd-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.src.rpm
MD5: 98c1de7e420374725ab79bc7b3d88f34
SHA-256: b867cb2d36027bfddc98a0fb47affab6c256e1a1b43e4b1c87c9d11bfe00fbf5
Size: 6.94 MB - mod_http2-1.15.7-5.module+el8+1598+5e93bbc9.4.src.rpm
MD5: b8fbcce8ecf459bf1f71b0ef62468044
SHA-256: 6b7929ec1f6303ed139ef5b6282876ddbaba633896b9606f25ea5674cf51403b
Size: 1.01 MB - mod_md-2.0.8-8.module+el8+1598+5e93bbc9.src.rpm
MD5: b53a1630a8fcc56a2fd6da51d7c839f0
SHA-256: a33729fba552e2c8603ddbd1340f0956a063b7a5f608ba077eed4a2b3580513f
Size: 635.32 kB
Asianux Server 8 for x86_64
- httpd-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: 9e99be5553fcd6173b09dae154fec9ef
SHA-256: 8d2a3bc2357a004abfcccfce060d1413610ac9a7022dcf7a10274661af8c13a2
Size: 1.41 MB - httpd-debugsource-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: 65df6769fc1758c5ee6ab15ca6843a3b
SHA-256: 1c2e5537b69cab936aa00eac65f484f6df34d52254e0ee8c16af59a0f4718f22
Size: 1.45 MB - httpd-devel-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: d27704e4a385bcea1e8574bd723ef198
SHA-256: 77334477f87ccd065380b8326ac885a8236b119ebc0c5a6ef0b4e80d9bd98b5b
Size: 224.80 kB - httpd-filesystem-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.noarch.rpm
MD5: d60864383b51a8d8d482be6abf918343
SHA-256: 97ea133213dd3c7cdb5e5d65000ea34e0b3bc22027bcb50e20ad40fff6dd2be9
Size: 41.62 kB - httpd-manual-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.noarch.rpm
MD5: af80e8e852bb90cc50da28033bfe39dc
SHA-256: bab9fcaf869d548a8b7c458647001491b5ece456e735b0027cd3a93746605e49
Size: 2.38 MB - httpd-tools-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: eb7f8a9511cc134e0147e20e7774a681
SHA-256: 4987a97a6007a89e514ba8d88cd90228d1fc702e2835805547ea94784c1b9eaf
Size: 108.65 kB - mod_http2-1.15.7-5.module+el8+1598+5e93bbc9.4.x86_64.rpm
MD5: f0ca1950e55c580a5eebc14d4e573b48
SHA-256: 029d9e4661fd27290b560486a982f9ef0d7ee44b31ac78022032f7d911e39f9a
Size: 153.67 kB - mod_http2-debugsource-1.15.7-5.module+el8+1598+5e93bbc9.4.x86_64.rpm
MD5: 023ae87122c83c9a60ca5de834a87b24
SHA-256: c866aee32ae8713902adfe5f27d6c53f3de19e7aea552c751291336524705a84
Size: 147.08 kB - mod_ldap-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: c3d45ddb07d3600e79dc03ab04f8bb40
SHA-256: 847248bc902b155fb35b6e8434b4acf09bc07cc3b52f05b300a1eccc8d11777b
Size: 86.94 kB - mod_md-2.0.8-8.module+el8+1598+5e93bbc9.x86_64.rpm
MD5: b6b1de07258ebf77e61adc288522199c
SHA-256: a290c4f78ef305c6058c1ce7b3eebfe177c17e8dd2094d5fb9e654f3457ecbd6
Size: 183.64 kB - mod_md-debugsource-2.0.8-8.module+el8+1598+5e93bbc9.x86_64.rpm
MD5: 42e0f17b5f450e49b3e347bbdf32fb6e
SHA-256: ee892772015d2e375198c8ead346221b0c39dc83f28c2ac1e0c666a499af595a
Size: 126.24 kB - mod_proxy_html-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: 71834331080d5163762a3d964e731934
SHA-256: 7c97a775f45bd62946d6a09304e3e8719c495b0b0ec85c21a27ca7c92ac4c477
Size: 64.05 kB - mod_session-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: dbac278a3920b859212cda6ea41bcc1b
SHA-256: cda95d68042bd26c3c7f060cf55417568bed7704e2db93134d22ca5699dc431b
Size: 75.71 kB - mod_ssl-2.4.37-51.module+el8+1598+5e93bbc9.5.ML.1.x86_64.rpm
MD5: 2136956945cbf79bc7bd2e2a4b30133d
SHA-256: 383fa48033d100581e0e55bf0ea89d6d16412bb9db3b10bcbcddaece47b4cee2
Size: 138.28 kB