Date: Thu, 07 Oct 2021 16:59:50 +0000 From: bugzilla-noreply@freebsd.org To: apache@FreeBSD.org Subject: [Bug 258988] [PATCH] www/apache34 - ritical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013) Message-ID: <bug-258988-16115@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D258988 Bug ID: 258988 Summary: [PATCH] www/apache34 - ritical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013) Product: Ports & Packages Version: Latest Hardware: Any URL: http://httpd.apache.org/security/vulnerabilities_24.ht ml OS: Any Status: New Severity: Affects Many People Priority: --- Component: Individual Port(s) Assignee: apache@FreeBSD.org Reporter: cy@FreeBSD.org Flags: maintainer-feedback?, merge-quarterly? Created attachment 228501 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D228501&action= =3Dedit Update apache24 to 2.4.51 Fixed in Apache HTTP Server 2.4.51 critical: Path Traversal and Remote Code Execution in Apache HTTP Server 2.= 4.49 and 2.4.50 (incomplete fix of CVE-2021-41773) (CVE-2021-42013) It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.= 50 was insufficient. An attacker could use a path traversal attack to map URLs= to files outside the directories configured by Alias-like directives. If files outside of these directories are not protected by the usual default configuration "require all denied", these requests can succeed. If = CGI scripts are also enabled for these aliased pathes, this could allow for rem= ote code execution. This issue only affects Apache 2.4.49 and Apache 2.4.50 and not earlier versions. Acknowledgements: Reported by Juan Escobar from Dreamlab Technologies, Fernando Mu=C3=B1oz from NULL Life CTF Team, and Shungo Kumasaka Reported to security team 2021-10-06 Update 2.4.51 released 2021-10-07 Affects 2.4.50, 2.4.49 --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-258988-16115>