4.3
CVSSv2

CVE-2011-4317

Published: 30/11/2011 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The mod_proxy module in the Apache HTTP Server 1.3.x up to and including 1.3.42, 2.0.x up to and including 2.0.64, and 2.2.x up to and including 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote malicious users to send requests to intranet servers via a malformed URI containing an @ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 1.3.38

apache http server 1.3.23

apache http server 1.3.27

apache http server 1.3.10

apache http server 1.3.33

apache http server 1.3.8

apache http server 1.3.36

apache http server 1.3.16

apache http server 1.3.1

apache http server 1.3.25

apache http server 1.3.28

apache http server 1.3.19

apache http server 1.3.31

apache http server 1.3.68

apache http server 1.3.24

apache http server 1.3.5

apache http server 1.3.20

apache http server 1.3.35

apache http server 1.3.6

apache http server 1.3.2

apache http server 1.3.34

apache http server 1.3.4

apache http server 1.3.13

apache http server 1.3.39

apache http server 1.3.30

apache http server 1.3.18

apache http server 1.3.65

apache http server 1.3.0

apache http server 1.3

apache http server 1.3.12

apache http server 1.3.3

apache http server 1.3.17

apache http server 1.3.1.1

apache http server 1.3.26

apache http server 1.3.9

apache http server 1.3.32

apache http server 1.3.15

apache http server 1.3.14

apache http server 1.3.42

apache http server 1.3.29

apache http server 1.3.22

apache http server 1.3.37

apache http server 1.3.11

apache http server 1.3.7

apache http server 1.3.41

apache http server 2.0.42

apache http server 2.0.64

apache http server 2.0.58

apache http server 2.0.47

apache http server 2.0.56

apache http server 2.0.50

apache http server 2.0.35

apache http server 2.0.37

apache http server 2.0.55

apache http server 2.0.44

apache http server 2.0.39

apache http server 2.0.52

apache http server 2.0.53

apache http server 2.0.57

apache http server 2.0.51

apache http server 2.0.28

apache http server 2.0.63

apache http server 2.0.41

apache http server 2.0.49

apache http server 2.0.9

apache http server 2.0.34

apache http server 2.0.61

apache http server 2.0.32

apache http server 2.0.38

apache http server 2.0.48

apache http server 2.0.45

apache http server 2.0.40

apache http server 2.0.36

apache http server 2.0.46

apache http server 2.0.54

apache http server 2.0.43

apache http server 2.0.59

apache http server 2.0

apache http server 2.0.60

apache http server 2.2.11

apache http server 2.2.0

apache http server 2.2.10

apache http server 2.2.13

apache http server 2.2.2

apache http server 2.2.4

apache http server 2.2.16

apache http server 2.2.21

apache http server 2.2.8

apache http server 2.2.14

apache http server 2.2.6

apache http server 2.2.19

apache http server 2.2.9

apache http server 2.2.18

apache http server 2.2.12

apache http server 2.2.3

apache http server 2.2.15

apache http server 2.2.20

apache http server 2.2.1

Vendor Advisories

Synopsis Moderate: httpd security update Type/Severity Security Advisory: Moderate Topic Updated httpd packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability S ...
Several security issues were fixed in the Apache HTTP Server ...

Exploits

source: wwwsecurityfocuscom/bid/50802/info Apache HTTP Server is prone to a security-bypass vulnerability Successful exploits will allow attackers to bypass certain security restrictions and obtain sensitive information about running web applications The following example patterns are available: RewriteRule ^(*) wwwexample ...

References

CWE-20https://bugzilla.redhat.com/show_bug.cgi?id=756483https://community.qualys.com/blogs/securitylabs/2011/11/23/apache-reverse-proxy-bypass-issuehttp://thread.gmane.org/gmane.comp.apache.devel/46440http://www.securitytracker.com/id?1026353http://www.mandriva.com/security/advisories?name=MDVSA-2012:003http://rhn.redhat.com/errata/RHSA-2012-0128.htmlhttp://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.htmlhttp://secunia.com/advisories/48551http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.htmlhttp://support.apple.com/kb/HT5501http://marc.info/?l=bugtraq&m=134987041210674&w=2http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.htmlhttp://lists.opensuse.org/opensuse-updates/2013-02/msg00012.htmlhttp://kb.juniper.net/JSA10585http://www.mandriva.com/security/advisories?name=MDVSA-2013:150http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.debian.org/security/2012/dsa-2405http://marc.info/?l=bugtraq&m=133294460209056&w=2https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9b4b963760a3cb5a4a70c902f325c6c0337fe51d5b8570416f8f8729%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r05b5357d1f6bd106f41541ee7d87aafe3f5ea4dc3e9bde5ce09baff8%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rad01d817195e6cc871cb1d73b207ca326379a20a6e7f30febaf56d24%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r476d175be0aaf4a17680ef98c5153b4d336eaef76fb2224cc94c463a%40%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f%40%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2012:0128https://usn.ubuntu.com/1368-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/36352/