Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

Multiple Vulnerabilities in Apache Server

Issued: 
Tuesday, 28 December, 2021
Last Revision: 
Tuesday, 28 December, 2021
Vendor: 
Severity Level: 
Summary: 

A new version of Apache web server (2.4.52) has been released by The Apache Software Foundation to address the Critical and High vulnerabilities, one of which could lead to remote code execution.

 

It is possible to cause a buffer overflow when parsing multipart content in mod_lua of affected Apache HTTP Server via a carefully crafted request body (r:parsebody() called from Lua scripts) by exploiting vulnerability (CVE-2021-44790).

 

Vulnerability (CVE-2021-44224) is a NULL dereference or SSRF in forward proxy configurations of Apache HTTP Server 2.4.51 and earlier. The vulnerability is exploitable via a crafted URI, leading to crash NULL pointer dereference or Server Side Request Forgery.

 

 

CVE/Vulnerability

Description 

CVSS3.0 Score

CVE-2021-44790

Buffer Overflow Vulnerability

9.8

CVE-2021-44224

NULL dereference or SSRF Vulnerability in forward proxy configurations

8.2

 

 

Table 1: Vulnerability details 

 

 

CVE/Vulnerability 

Affected Product(s)

CVE-2021-44790

Apache HTTP Server <=2.4.51

CVE-2021-44224

Apache HTTP Server >=2.4.7, <=2.4.51

 

 

 

                                                                                       Table 2: Vulnerable versions 

Recommendation: 

Organizations are strongly encouraged to upgrade to Apache version 2.4.52 or later.

 

Released version mitigates both mentioned security vulnerabilities. Organization are advised assess their environment to identify the vulnerable version and take necessary action to mitigate these vulnerabilities accordingly.