Apache 2.4.x < 2.4.46 Multiple Vulnerabilities

critical Web App Scanning Plugin ID 112580

Synopsis

Apache 2.4.x < 2.4.46 Multiple Vulnerabilities

Description

According to its banner, the version of Apache running on the remote host is 2.4.x prior to 2.4.46. It is, therefore, affected by multiple vulnerabilities:

- mod_proxy_uwsgi info disclosure and possible remote code execution (CVE-2020-11984)

- When trace/debug was enabled for the HTTP/2 module and on certain traffic edge patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel of mod_http2 above info will mitigate this vulnerability for unpatched servers. (CVE-2020-11993)

- A specially crafted value for the Cache-Digest header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via H2Push off will mitigate this vulnerability for unpatched servers. (CVE-2020-9490)

Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache version 2.4.46 or later.

See Also

https://archive.apache.org/dist/httpd/CHANGES_2.4.46

https://httpd.apache.org/security/vulnerabilities_24.html#2.4.44

Plugin Details

Severity: Critical

ID: 112580

Type: remote

Published: 9/9/2020

Updated: 3/14/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2020-11984

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS Score Source: CVE-2020-11984

Vulnerability Information

CPE: cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/7/2020

Vulnerability Publication Date: 8/7/2020

Reference Information

CVE: CVE-2020-11984, CVE-2020-11993, CVE-2020-9490