5
CVSSv2

CVE-2013-5704

Published: 15/04/2014 Updated: 14/04/2022
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 447
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote malicious users to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache http server 2.2.0

apache http server 2.2.2

apache http server 2.2.3

apache http server 2.2.4

apache http server 2.2.5

apache http server 2.2.6

apache http server 2.2.8

apache http server 2.2.9

apache http server 2.2.10

apache http server 2.2.11

apache http server 2.2.12

apache http server 2.2.13

apache http server 2.2.14

apache http server 2.2.15

apache http server 2.2.16

apache http server 2.2.17

apache http server 2.2.18

apache http server 2.2.19

apache http server 2.2.20

apache http server 2.2.21

apache http server 2.2.22

apache http server 2.2.23

apache http server 2.2.24

apache http server 2.2.25

apache http server 2.2.26

apache http server 2.2.27

apache http server 2.4.1

apache http server 2.4.2

apache http server 2.4.3

apache http server 2.4.4

apache http server 2.4.6

apache http server 2.4.7

apache http server 2.4.9

apache http server 2.4.10

redhat enterprise linux desktop 6.0

redhat enterprise linux desktop 7.0

redhat enterprise linux eus 7.3

redhat enterprise linux eus 7.4

redhat enterprise linux eus 7.5

redhat enterprise linux eus 7.6

redhat enterprise linux eus 7.7

redhat enterprise linux server 6.0

redhat enterprise linux server 7.0

redhat enterprise linux server aus 7.3

redhat enterprise linux server aus 7.4

redhat enterprise linux server aus 7.6

redhat enterprise linux server aus 7.7

redhat enterprise linux server tus 7.3

redhat enterprise linux server tus 7.6

redhat enterprise linux server tus 7.7

redhat enterprise linux workstation 6.0

redhat enterprise linux workstation 7.0

redhat jboss_enterprise_web_server 3.0.0

redhat jboss_enterprise_web_server 2.0.0

oracle enterprise manager ops center

oracle enterprise manager ops center 12.1.4

oracle enterprise manager ops center 12.2.0

oracle enterprise manager ops center 12.2.1

oracle enterprise manager ops center 12.3.0

oracle http server 10.1.3.5.0

oracle http server 11.1.1.7.0

oracle http server 12.1.2.0

oracle http server 12.1.3.0

oracle linux 6

oracle solaris 11.2

apple mac os x

apple mac os x server

canonical ubuntu linux 10.04

canonical ubuntu linux 12.04

canonical ubuntu linux 14.04

canonical ubuntu linux 14.10

Vendor Advisories

Synopsis Moderate: Red Hat JBoss Web Server 302 security update Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 302 packages are now available for RedHat Enterprise Linux 6Red Hat Product Security has rated this update as having Moderate securityimpact Common Vulnerabi ...
Synopsis Moderate: Red Hat JBoss Web Server 302 security update Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 302 packages are now available for RedHat Enterprise Linux 7Red Hat Product Security has rated this update as having Moderate securityimpact Common Vulnerabi ...
A flaw was found in the way httpd handled HTTP Trailer headers when processing requests using chunked encoding A malicious client could use Trailer headers to set additional HTTP headers after header processing was performed by other modules This could, for example, lead to a bypass of header restrictions defined with mod_headers ...
The mod_headers module in the Apache HTTP Server 2222 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding NOTE: the vendor states "this is not a security issue in httpd as such" ...
Several security issues were fixed in the Apache HTTP Server ...
mod_luac in the mod_lua module in the Apache HTTP Server 23x and 24x through 2410 does not support an httpd configuration in which the same Lua authorization provider is used with different arguments within different contexts, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by leveraging mu ...
<!-- content goes here --> Oracle Critical Patch Update Advisory - January 2015 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisor ...
<!-- content goes here --> Oracle Solaris Third Party Bulletin - January 2015 Description The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities fixed in third party software that is included in Oracle Solaris distributions Starting January 20, 2015, Third Party Bulletins are released on the same day wh ...
Oracle Linux Bulletin - January 2016 Description The Oracle Linux Bulletin lists all CVEs that had been resolved and announced in Oracle Linux Security Advisories (ELSA) in the last one month prior to the release of the bulletin Oracle Linux Bulletins are published on the same day as Oracle Critical Patch Updates are relea ...
Oracle Critical Patch Update Advisory - July 2015 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory Thus, prior Critical Patch U ...
Oracle Critical Patch Update Advisory - January 2016 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory Thus, prior Critical Pat ...

Github Repositories

DC 1: Vulnhub Walkthrough Scanning nmap 192168122184 nmap -sV -A 192168122184 (service version scan) nmap -sV -A --script vuln 192168122184 (Vulnerability scan) root@kali:~# **nmap -sV -A 192168122184** Starting Nmap 780SVN ( nmaporg ) at 2021-05-27 02:58 EDT Stats: 0:00:17 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan NSE Timing: About 973

internetdb Fast IP Lookups for Open Ports and Vulnerabilities Description Shodan shodanio/ scans the internet for hosts and services and maintains a few APIs into that data One API is the InternetDB internetdbshodanio/, which allows for free querying of open ports and vulnerabilities Tools are provided to query this servce What’s Inside The Tin The f

Домашнее задание к занятию "Уязвимости и атаки на информационные системы" - Никулин Михаил Сергеевич Задание 1 ┌──(kali㉿kali)-[~] └─$ nmap -A --script vulnersnse 1921680169 Starting Nmap 793 ( nmaporg ) at 2023-04-10 13:43 EDT Nmap scan report for 192

Домашнее задание к занятию "131 «Уязвимости и атаки на информационные системы»" - Живарев Игорь Задание 1 Разрешённые сетевые службы: Обнаруженные уязвимости при агресивном сканировании: Обнаруж

Домашнее задание к занятию 131 «Уязвимости и атаки на информационные системы» — Александр Гумлевой Задание 1 Скачайте и установите виртуальную машину Metasploitable: sourceforgenet/projects/metasploitable/ Это типовая

whitehat nmap -sV --script vuln 192168123162 output Starting Nmap 793 ( nmaporg ) at 2022-12-25 15:11 EST Pre-scan script results: | broadcast-avahi-dos: | Discovered hosts: | 22400251 | After NULL UDP avahi packet DoS (CVE-2011-1002) |_ Hosts are all up (not vulnerable) Nmap scan report for 192168123162 Host is up (000025s latency) Not shown: 97

References

NVD-CWE-noinfohttp://martin.swende.se/blog/HTTPChunked.htmlhttp://marc.info/?l=apache-httpd-dev&m=139636309822854&w=2http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?r1=1610674&r2=1610814&diff_format=hhttp://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.chttp://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.htmlhttp://www.ubuntu.com/usn/USN-2523-1http://rhn.redhat.com/errata/RHSA-2015-0325.htmlhttps://support.apple.com/HT204659http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.htmlhttp://www.securityfocus.com/bid/66550http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.htmlhttps://support.apple.com/HT205219http://lists.apple.com/archives/security-announce/2015/Sep/msg00004.htmlhttp://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.htmlhttp://marc.info/?l=bugtraq&m=144493176821532&w=2http://marc.info/?l=bugtraq&m=143403519711434&w=2http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0062.htmlhttp://rhn.redhat.com/errata/RHSA-2016-0061.htmlhttps://access.redhat.com/errata/RHSA-2015:2660http://rhn.redhat.com/errata/RHSA-2015-2661.htmlhttps://access.redhat.com/errata/RHSA-2015:2659https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04832246https://security.gentoo.org/glsa/201504-03http://rhn.redhat.com/errata/RHSA-2015-1249.htmlhttps://httpd.apache.org/security/vulnerabilities_24.htmlhttp://www.mandriva.com/security/advisories?name=MDVSA-2014:174http://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x/CHANGEShttps://lists.apache.org/thread.html/56c2e7cc9deb1c12a843d0dc251ea7fd3e7e80293cde02fcd65286ba@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/84a3714f0878781f6ed84473d1a503d2cc382277e100450209231830@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/re3d27b6250aa8548b8845d314bb8a350b3df326cacbbfdfe4d455234@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rd18c3c43602e66f9cdcf09f1de233804975b9572b0456cc582390b6f@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/ra7f6aeb28661fbf826969526585f16856abc4615877875f9d3b35ef4@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9821b0a32a1d0a1b4947abb6f3630053fcbb2ec905d9a32c2bd4d4ee@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r83109088737656fa6307bd99ab40f8ff0269ae58d3f7272d7048494a@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rcc44594d4d6579b90deccd4536b5d31f099ef563df39b094be286b9e@%3Ccvs.httpd.apache.org%3Ehttps://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2015:2659https://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2013-5704https://usn.ubuntu.com/2523-1/https://www.securityfocus.com/bid/66550http://tools.cisco.com/security/center/viewAlert.x?alertId=39946