4.3
CVSSv2

CVE-2011-3639

Published: 30/11/2011 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The mod_proxy module in the Apache HTTP Server 2.0.x up to and including 2.0.64 and 2.2.x prior to 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote malicious users to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.0.42

apache http server 2.0.58

apache http server 2.2.11

apache http server 2.2.0

apache http server 2.2.10

apache http server 2.2.13

apache http server 2.0.47

apache http server 2.0.56

apache http server 2.0.50

apache http server 2.0.27

apache http server 2.2.2

apache http server 2.0.12

apache http server 2.0.20

apache http server2.0a9

apache http server 2.2.4

apache http server 2.0.35

apache http server 2.0.37

apache http server 2.0.55

apache http server 2.2.17

apache http server 2.0.44

apache http server 2.2.16

apache http server 2.0.39

apache http server 2.0.18

apache http server 2.0.25

apache http server 2.2.8

apache http server 2.0.52

apache http server2.0a7

apache http server 2.0.21

apache http server 2.0.53

apache http server 2.0.57

apache http server 2.0.51

apache http server 2.0.33

apache http server 2.0.17

apache http server 2.0.63

apache http server 2.2.14

apache http server 2.0.22

apache http server 2.0.15

apache http server 2.0.41

apache http server 2.0.49

apache http server 2.0.29

apache http server 2.0.26

apache http server2.0a8

apache http server 2.0.23

apache http server2.0a2

apache http server 2.0.61

apache http server 2.2.6

apache http server 2.0.32

apache http server 2.0.34

apache http server2.0a5

apache http server2.0a3

apache http server 2.0.38

apache http server 2.0.19

apache http server 2.2.9

apache http server2.0a4

apache http server 2.0.24

apache http server 2.0.48

apache http server 2.0.16

apache http server 2.0.45

apache http server 2.2.12

apache http server 2.0.40

apache http server 2.0.36

apache http server2.0a6

apache http server 2.2.3

apache http server 2.0.46

apache http server 2.0.54

apache http server 2.2.15

apache http server 2.0.43

apache http server 2.0.11

apache http server 2.0.59

apache http server 2.0.14

apache http server 2.0.28

apache http server 2.0.31

apache http server2.0a1

apache http server 2.0.30

apache http server 2.2.1

apache http server 2.0.13

Vendor Advisories

Synopsis Moderate: httpd security update Type/Severity Security Advisory: Moderate Topic Updated httpd packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
Synopsis Moderate: httpd security update Type/Severity Security Advisory: Moderate Topic Updated httpd packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
It was discovered that the fix for CVE-2011-3368 did not completely address the problem An attacker could bypass the fix and make a reverse proxy connect to an arbitrary server not directly accessible to the attacker by sending an HTTP version 09 request, or by using a specially-crafted URI (CVE-2011-3639, CVE-2011-4317) The httpd server include ...

Exploits

source: wwwsecurityfocuscom/bid/51869/info Apache HTTP Server is prone to a security-bypass vulnerability Successful exploits will allow attackers to bypass certain security restrictions and obtain sensitive information about running web applications RewriteRule ^(*) wwwexamplecom$1 ProxyPassMatch ^(*) wwwexamplec ...