QID 376863

Date Published: 2023-04-10

QID 376863: IBM Hypertext Transfer Protocol (HTTP) Server Multiple Vulnerabilities (6595149)

BM HTTP Server powered by Apache is based on the Apache HTTP Server available for multiple platforms.

CVE-2022-28614: Apache HTTP Server could allow a remote attacker to obtain sensitive information, caused by an error in the ap_rwrite() function.
CVE-2022-28615: Apache HTTP Server could allow a remote attacker to obtain sensitive information, caused by a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer.
CVE-2022-29404: Apache HTTP Server is vulnerable to a denial of service, caused by no default limit on possible input size.
CVE-2022-26377:Apache HTTP Server is vulnerable to HTTP request smuggling, caused by an inconsistent Interpretation of HTTP Requests vulnerability in mod_proxy_ajp.
CVE-2022-31813: Apache HTTP Server could allow a remote attacker to bypass security restrictions, caused by the failure to send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism.
CVE-2022-30556: Apache HTTP Server could allow a remote attacker to obtain sensitive information, caused by an error in mod_lua with websockets.

Affected Versions:
IBM HTTP Server V9.0.0.0 through 9.0.5.12
IBM HTTP Server V8.5.0.0 through 8.5.5.22
IBM HTTP Server V8.0.0.0 through 8.0.0.15
IBM HTTP Server V70.0.0 through 7.0.0.45
QID Detection Logic (Authenticated):
Operating System: Windows
The QID checks the key "HKLM\SYSTEM\CurrentControlSet\Services" to see if IBM HTTP vulnerable version installed on the host or not.

QID Detection Logic (Authenticated):
Operating System: Linux
The QID checks the vulnerable version IBM HTTP Server. "version.signature" is used to verify the version.

An attacker could exploit this vulnerability to smuggle requests to the AJP server it forwards requests to.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    The vendor has released advisories and updates to fix these vulnerabilities. Refer to the following link for further details: 6595149
    Vendor References
    Software Advisories
    Advisory ID Software Component Link
    6595149 URL Logo www.ibm.com/support/pages/node/6595149