QID 353971

Date Published: 2022-07-11

QID 353971: Amazon Linux Security Advisory for httpd24 : ALAS-2022-1607

An http request smuggling vulnerability was found in the mod_proxy_ajp module of httpd.
This flaw allows an attacker to smuggle requests to the ajp server, where it forwards requests. (
( CVE-2022-26377) an out-of-bounds read vulnerability was found in the mod_isapi module of httpd.
The issue occurs when httpd is configured to process requests with the mod_isapi module. (
( CVE-2022-28330) an out-of-bounds read vulnerability was found in httpd.
A very large input to the ap_rputs and ap_rwrite functions can lead to an integer overflow and result in an out-of-bounds read. (
( CVE-2022-28614) an out-of-bounds read vulnerability was found in httpd.
A very large input to the ap_strcmp_match function can lead to an integer overflow and result in an out-of-bounds read. (
( CVE-2022-28615) a flaw was found in the mod_lua module of httpd.
A malicious request to a lua script that calls parsebody(0) can lead to a denial of service due to no default limit on the possible input size. (
( CVE-2022-29404) a flaw was found in the mod_sed module of httpd.
A very large input to the mod_sed module can result in a denial of service due to excessively large memory allocations. (
( CVE-2022-30522) a flaw was found in the mod_lua module of httpd.
The data returned by the wsread function may point past the end of the storage allocated for the buffer, resulting in information disclosure.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2022-1607 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2022-1607 Amazon Linux URL Logo alas.aws.amazon.com/ALAS-2022-1607.html