QID 354845

Date Published: 2023-03-23

QID 354845: Amazon Linux Security Advisory for httpd24 : ALAS-2023-1711

a carefully crafted if: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent.
This could cause the process to crash.
This issue affects apache http server 2.4.54 and earlier. (
( CVE-2006-20001) inconsistent interpretation of http requests (http request smuggling) vulnerability in mod_proxy_ajp of apache http server allows an attacker to smuggle requests to the ajp server it forwards requests to.
This issue affects apache http server apache http server 2.4 version 2.4.54 and prior versions. (
( CVE-2022-36760) prior to apache http server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body.
If the later headers have any security purpose, they will not be interpreted by the client. (
( CVE-2022-37436) some mod_proxy configurations on apache http server versions 2.4.0 through 2.4.55 allow a http request smuggling attack.
Configurations are affected when mod_proxy is enabled along with some form of rewriterule or proxypassmatch in which a non-specific pattern matches some portion of the user-supplied request-target (url) data and is then re-inserted into the proxied request-target using variable substitution.
For example, something like: rewriteengine on rewriterule "^/here/(.*)" "
Http://example.com:8080/elsewhere?$1"; [p] proxypassreverse /here/ http://example.com:8080/ request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended urls to existing origin servers, and cache poisoning.
This issue affects apache http server: from 2.4.30 through 2.4.55.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as Medium - 5.4 severity.
  • Solution
    Please refer to Amazon advisory: ALAS-2023-1711 for affected packages and patching details, or update with your package manager.
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    ALAS-2023-1711 amazon linux URL Logo alas.aws.amazon.com/ALAS-2023-1711.html