QID 354343

Date Published: 2022-12-21

QID 354343: Amazon Linux Security Advisory for httpd : ALAS2022-2022-018

There's a null pointer dereference and server-side request forgery flaw in httpd's mod_proxy module, when it is configured to be used as a forward proxy.
A crafted packet could be sent on the adjacent network to the forward proxy that could cause a crash, or potentially ssrf via misdirected unix domain socket requests.
In the worst case, this could cause a denial of service or compromise to confidentiality of data. (
( CVE-2021-44224) a buffer overflow flaw in httpd's lua module could allow an out-of-bounds write.
An attacker who is able to submit a crafted request to an httpd instance that is using the lua module may be able to cause an impact to confidentiality, integrity, and/or availability. (
( CVE-2021-44790)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALAS2022-2022-018 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 354343

    Software Advisories
    Advisory ID Software Component Link
    ALAS2022-2022-018 amazon linux 2022 URL Logo alas.aws.amazon.com/AL2022/ALAS-2022-018.html