SUBJECT: Urgent Security Update: Apache HTTP Server Vulnerabilities Mitigation
TECH STACK: Apache HTTP Server
DATE(S) ISSUED: 03/07/2023
NVD LAST MODIFIED: 10/21/2023
CRITICALITY: CRITICAL
OVERVIEW: This advisory communicates essential steps to mitigate multiple critical vulnerabilities identified in Apache HTTP Server versions prior to 2.4.56. Notably, these vulnerabilities pertain to HTTP request splitting and HTTP response splitting, potentially leading to HTTP Request Smuggling attacks and HTTP Response Smuggling vulnerabilities, respectively. Immediate action is required to upgrade Apache HTTP Server installations to version 2.4.56 or later to address these security concerns.
VULNERABILITY DETAILS:
CVE-2023-25690: Concerns a vulnerability with mod_proxy
and mod_rewrite
where specific configurations allow HTTP Request Smuggling attacks. Attackers can exploit non-specific pattern matches in rewrite rules or ProxyPassMatch
directives to inject requests, leading to access control bypass, unintended URL proxying, and cache poisoning.
CVE-2023-27522: Involves a vulnerability in mod_proxy_uwsgi
that allows HTTP Response Smuggling. Special characters in the origin response header can truncate or split the response, affecting versions 2.4.30 through 2.4.55.
SOLUTION/MITIGATION:
ADDITIONAL INFORMATION:
VERIFICATION:
mod_proxy
, mod_rewrite
, and mod_proxy_uwsgi
, for compliance with security best practices.REFERENCES:
ACTION ITEMS:
mod_proxy
, mod_rewrite
, and mod_proxy_uwsgi
to identify and rectify potential vulnerabilities.Prompt attention to these vulnerabilities is paramount to maintaining the integrity and security of your web server infrastructure.