5
CVSSv2

CVE-2011-3368

Published: 05/10/2011 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 536
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The mod_proxy module in the Apache HTTP Server 1.3.x up to and including 1.3.42, 2.0.x up to and including 2.0.64, and 2.2.x up to and including 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote malicious users to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.3.38

apache http server 1.3.23

apache http server 1.3.27

apache http server 1.3.10

apache http server 1.3.33

apache http server 1.3.8

apache http server 1.3.36

apache http server 1.3.16

apache http server 1.3.1

apache http server 1.3.25

apache http server 1.3.28

apache http server 1.3.19

apache http server 1.3.31

apache http server 1.3.68

apache http server 1.3.24

apache http server 1.3.5

apache http server 1.3.20

apache http server 1.3.35

apache http server 1.3.6

apache http server 1.3.2

apache http server 1.3.34

apache http server 1.3.4

apache http server 1.3.13

apache http server 1.3.39

apache http server 1.3.30

apache http server 1.3.18

apache http server 1.3.65

apache http server 1.3.0

apache http server 1.3

apache http server 1.3.12

apache http server 1.3.3

apache http server 1.3.17

apache http server 1.3.1.1

apache http server 1.3.26

apache http server 1.3.9

apache http server 1.3.32

apache http server 1.3.15

apache http server 1.3.14

apache http server 1.3.42

apache http server 1.3.29

apache http server 1.3.22

apache http server 1.3.37

apache http server 1.3.11

apache http server 1.3.7

apache http server 1.3.41

apache http server 2.0.42

apache http server 2.0.64

apache http server 2.0.58

apache http server 2.0.47

apache http server 2.0.56

apache http server 2.0.50

apache http server 2.0.35

apache http server 2.0.37

apache http server 2.0.55

apache http server 2.0.44

apache http server 2.0.39

apache http server 2.0.52

apache http server 2.0.53

apache http server 2.0.57

apache http server 2.0.51

apache http server 2.0.28

apache http server 2.0.63

apache http server 2.0.41

apache http server 2.0.49

apache http server 2.0.9

apache http server 2.0.34

apache http server 2.0.61

apache http server 2.0.32

apache http server 2.0.38

apache http server 2.0.48

apache http server 2.0.45

apache http server 2.0.40

apache http server 2.0.36

apache http server 2.0.46

apache http server 2.0.54

apache http server 2.0.43

apache http server 2.0.59

apache http server 2.0

apache http server 2.0.60

apache http server 2.2.11

apache http server 2.2.0

apache http server 2.2.10

apache http server 2.2.13

apache http server 2.2.2

apache http server 2.2.4

apache http server 2.2.16

apache http server 2.2.21

apache http server 2.2.8

apache http server 2.2.14

apache http server 2.2.6

apache http server 2.2.19

apache http server 2.2.9

apache http server 2.2.18

apache http server 2.2.12

apache http server 2.2.3

apache http server 2.2.15

apache http server 2.2.20

apache http server 2.2.1

Vendor Advisories

Multiple vulnerabilities and a regression were fixed in the Apache HTTP server ...
Synopsis Moderate: httpd security update Type/Severity Security Advisory: Moderate Topic Updated httpd packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
Synopsis Moderate: httpd security update Type/Severity Security Advisory: Moderate Topic Updated httpd packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
Synopsis Moderate: httpd security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated httpd packages that fix multiple security issues and one bug arenow available for JBoss Enterprise Web Server 102 for Red Hat EnterpriseLinux 5 and 6The Red Hat Security Response Team has rated th ...
It was discovered that the Apache HTTP Server did not properly validate the request URI for proxied requests In certain configurations, if a reverse proxy used the ProxyPassMatch directive, or if it used the RewriteRule directive with the proxy flag, a remote attacker could make the proxy connect to an arbitrary server, possibly disclosing sensiti ...

Exploits

#!/usr/bin/env python import socket import string import getopt, sys known_ports = [0,21,22,23,25,53,69,80,110,137,139,443,445,3306,3389,5432,5900,8080] def send_request(url, apache_target, apache_port, internal_target, internal_port, resource): get = "GET " + url + "@" + internal_target + ":" + internal_port + "/" + resource + " HTTP/11\r\ ...
The mod_proxy module in the Apache HTTP Server 13x through 1342, 20x through 2064, and 22x through 2221 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an i ...
Context discovered a security vulnerability which allows for Apache in reverse proxy mode to be used to access internal/DMZ systems due to a weakness in its handling of URLs being processed by mod_rewrite Versions 13 and 2x are affected ...

Nmap Scripts

http-vuln-cve2011-3368

Tests for the CVE-2011-3368 (Reverse Proxy Bypass) vulnerability in Apache HTTP server's reverse proxy mode. The script will run 3 tests:

nmap --script http-vuln-cve2011-3368 <targets>

PORT STATE SERVICE 80/tcp open http | http-vuln-cve2011-3368: | VULNERABLE: | Apache mod_proxy Reverse Proxy Security Bypass | State: VULNERABLE | IDs: CVE:CVE-2011-3368 OSVDB:76079 | Description: | An exposure was reported affecting the use of Apache HTTP Server in | reverse proxy mode. The exposure could inadvertently expose internal | servers to remote users who send carefully crafted requests. | Disclosure date: 2011-10-05 | Extra information: | Proxy allows requests to external websites | References: | http://osvdb.org/76079 |_ http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368
http-vuln-cve2011-3368

Tests for the CVE-2011-3368 (Reverse Proxy Bypass) vulnerability in Apache HTTP server's reverse proxy mode. The script will run 3 tests:

nmap --script http-vuln-cve2011-3368 <targets>

PORT STATE SERVICE 80/tcp open http | http-vuln-cve2011-3368: | VULNERABLE: | Apache mod_proxy Reverse Proxy Security Bypass | State: VULNERABLE | IDs: CVE:CVE-2011-3368 BID:49957 | Description: | An exposure was reported affecting the use of Apache HTTP Server in | reverse proxy mode. The exposure could inadvertently expose internal | servers to remote users who send carefully crafted requests. | Disclosure date: 2011-10-05 | Extra information: | Proxy allows requests to external websites | References: | https://www.securityfocus.com/bid/49957 |_ https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3368

Github Repositories

TL Pentest a rendre le 14 fevrier

PenTest Root/kali 14 fevrier Outils: Metasploit: open source Pen Testing tool, containing nmap, 1500 exploits Armitage: interface graphique pour Metasploit Kali CVE Metasploit msfconsole to launch show exploits / use &lt;path/to/exploit&gt; / show options nmap -A -p- -T4 VM Ip Adress 192168562 msfvenom: tool to create viruses exploit: code pour s'introduire d

PoC Scan. (cve-2011-3368)

CVE-2011-3368 PoC Exploit (cve-2011-3368) Install: git clone githubcom/colorblindpentester/CVE-2011-3368 cd CVE-2011-3368 python2 CVE-2011-3368py Tested on: OS X (macos) Parrot OS Kali linux

References

CWE-20https://bugzilla.redhat.com/show_bug.cgi?id=740045http://web.archiveorange.com/archive/v/ZyS0hzECD5zzb2NkvQlthttp://svn.apache.org/viewvc?view=revision&revision=1179239http://www.exploit-db.com/exploits/17969http://www.contextis.com/research/blog/reverseproxybypass/http://secunia.com/advisories/46288http://www.securitytracker.com/id?1026144http://secunia.com/advisories/46414http://seclists.org/fulldisclosure/2011/Oct/232http://www-01.ibm.com/support/docview.wss?uid=nas2b7c57b1f1035675186257927003c8d48http://www.securityfocus.com/bid/49957http://www-01.ibm.com/support/docview.wss?uid=nas2064c7e5f53452ff686257927003c8d42http://www.mandriva.com/security/advisories?name=MDVSA-2011:144http://www.redhat.com/support/errata/RHSA-2011-1391.htmlhttp://www.redhat.com/support/errata/RHSA-2011-1392.htmlhttp://osvdb.org/76079http://seclists.org/fulldisclosure/2011/Oct/273http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.htmlhttp://www.oracle.com/technetwork/topics/security/cpujul2012-392727.htmlhttp://secunia.com/advisories/48551http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.htmlhttp://support.apple.com/kb/HT5501http://marc.info/?l=bugtraq&m=134987041210674&w=2http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.htmlhttp://lists.opensuse.org/opensuse-updates/2013-02/msg00009.htmlhttp://kb.juniper.net/JSA10585http://www.mandriva.com/security/advisories?name=MDVSA-2013:150http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttps://exchange.xforce.ibmcloud.com/vulnerabilities/70336http://www.debian.org/security/2012/dsa-2405http://rhn.redhat.com/errata/RHSA-2012-0543.htmlhttp://rhn.redhat.com/errata/RHSA-2012-0542.htmlhttp://marc.info/?l=bugtraq&m=133294460209056&w=2https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3Ehttps://usn.ubuntu.com/1259-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/17969/