Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-3639 (GCVE-0-2011-3639)
Vulnerability from cvelistv5 – Published: 2011-11-30 02:00 – Updated: 2024-08-06 23:37- n/a
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T23:37:48.644Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
},
{
"name": "RHSA-2012:0128",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745"
},
{
"name": "DSA-2405",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2012/dsa-2405"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-11-15T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-28T20:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
},
{
"name": "RHSA-2012:0128",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745"
},
{
"name": "DSA-2405",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2012/dsa-2405"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2011-3639",
"datePublished": "2011-11-30T02:00:00.000Z",
"dateReserved": "2011-09-21T00:00:00.000Z",
"dateUpdated": "2024-08-06T23:37:48.644Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-RQG3-PFXX-WWQ3
Vulnerability from github – Published: 2022-05-14 04:02 – Updated: 2022-05-14 04:02The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
{
"affected": [],
"aliases": [
"CVE-2011-3639"
],
"database_specific": {
"cwe_ids": [
"CWE-20"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-11-30T04:05:00Z",
"severity": "MODERATE"
},
"details": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.",
"id": "GHSA-rqg3-pfxx-wwq3",
"modified": "2022-05-14T04:02:51Z",
"published": "2022-05-14T04:02:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-3639"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"type": "WEB",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2012/dsa-2405"
}
],
"schema_version": "1.4.0",
"severity": []
}
CERTA-2012-AVI-156
Vulnerability from certfr_avis - Published: 2012-03-20 - Updated: 2012-03-20
De multiples vulnérabilités ont été corrigées dans les produits IBM HTTP Server. L'exploitation de ces vulnérabilités pouvait conduire à une interruption du service HTTP.
Description
Les correctifs concernent la version d'Apache HTTP Server 2.2.21 (incluse dans le produit IBM) et ses versions antérieures. Un utilisateur local peut provoquer la fermeture de l'application en modifiant certains champs de la mémoire partagée du scoreboard.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Versions ant\u00e9rieures \u00e0 IBM HTTP Server 8.0.0.23.",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Versions ant\u00e9rieures \u00e0 IBM HTTP Server 7.0.0.23 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Versions ant\u00e9rieures \u00e0 IBM HTTP Server 6.1.0.43 ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nLes correctifs concernent la version d\u0027Apache HTTP Server 2.2.21\n(incluse dans le produit IBM) et ses versions ant\u00e9rieures. Un\nutilisateur local peut provoquer la fermeture de l\u0027application en\nmodifiant certains champs de la m\u00e9moire partag\u00e9e du scoreboard.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-0053",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0053"
},
{
"name": "CVE-2012-0031",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0031"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2011-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3639"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
}
],
"initial_release_date": "2012-03-20T00:00:00",
"last_revision_date": "2012-03-20T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg27008517 du 19 mars 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27008517"
}
],
"reference": "CERTA-2012-AVI-156",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-03-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eIBM HTTP Server\u003c/span\u003e. L\u0027exploitation de ces\nvuln\u00e9rabilit\u00e9s pouvait conduire \u00e0 une interruption du service HTTP.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans IBM HTTP Server",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM SWG27008517",
"url": null
}
]
}
CERTA-2012-AVI-023
Vulnerability from certfr_avis - Published: 2012-01-18 - Updated: 2012-01-18
Plusieurs vulnérabilités découvertes dans les produits IBM ont été corrigées par l'éditeur.
Description
Plusieurs vulnérabilités dans les produits IBM peuvent être exploitées par une personne malintentionnée afin de contourner la politique de sécurité, d'injecter du code indirect à distance, de réaliser un déni de service distant, d'élever ses privilèges ou encore d'exécuter du code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Rational License Key Server 8.x ;",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server 6.1.x ;",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server 7.0.x ;",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM HTTP Server 7.0.x.",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM WebSphere Application Server 8.0.x ;",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Description\n\nPlusieurs vuln\u00e9rabilit\u00e9s dans les produits IBM peuvent \u00eatre exploit\u00e9es\npar une personne malintentionn\u00e9e afin de contourner la politique de\ns\u00e9curit\u00e9, d\u0027injecter du code indirect \u00e0 distance, de r\u00e9aliser un d\u00e9ni de\nservice distant, d\u0027\u00e9lever ses privil\u00e8ges ou encore d\u0027ex\u00e9cuter du code\narbitraire \u00e0 distance.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2009-1890",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1890"
},
{
"name": "CVE-2011-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3348"
},
{
"name": "CVE-2009-3560",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3560"
},
{
"name": "CVE-2011-1389",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1389"
},
{
"name": "CVE-2010-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0434"
},
{
"name": "CVE-2010-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
},
{
"name": "CVE-2009-3094",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3094"
},
{
"name": "CVE-2009-3095",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3095"
},
{
"name": "CVE-2010-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2009-3555",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3555"
},
{
"name": "CVE-2009-1891",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1891"
},
{
"name": "CVE-2009-0023",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0023"
},
{
"name": "CVE-2009-1956",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1956"
},
{
"name": "CVE-2009-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2412"
},
{
"name": "CVE-2011-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3607"
},
{
"name": "CVE-2009-1195",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1195"
},
{
"name": "CVE-2010-0408",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0408"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2011-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3639"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2009-3720",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3720"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2009-1955",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1955"
}
],
"initial_release_date": "2012-01-18T00:00:00",
"last_revision_date": "2012-01-18T00:00:00",
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg21577760 du 10 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21577760"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg27014506 du 16 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg27014506"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM54061 du 12 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM54061"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM48384 du 21 septembre 2011 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM48384"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg24031821 du 17 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg24031821"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM50426 du 19 octobre 2011 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM50426"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM45731 du 12 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM45731"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg227022958 du 16 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg227022958"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg1PM47852 du 14 septembre 2011 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg1PM47852"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 IBM swg227014463 du 16 janvier 2012 :",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg227014463"
}
],
"reference": "CERTA-2012-AVI-023",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-01-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s d\u00e9couvertes dans les produits IBM ont \u00e9t\u00e9\ncorrig\u00e9es par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": []
}
CERTA-2012-AVI-218
Vulnerability from certfr_avis - Published: 2012-04-18 - Updated: 2012-04-18
De multiples vulnérabilités ont été corrigées dans HP System Management Homepage. Leur exploitation permet, entre autres, d'exécuter du code arbitraire à distance et de réaliser des dénis de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
HP System Management Homepage versions antérieures à 7.0.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003e\u003cSPAN class=\"textit\"\u003eHP System Management Homepage\u003c/SPAN\u003e versions ant\u00e9rieures \u00e0 7.0.\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2202"
},
{
"name": "CVE-2011-0195",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0195"
},
{
"name": "CVE-2011-3192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3192"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2011-3348",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3348"
},
{
"name": "CVE-2011-3210",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3210"
},
{
"name": "CVE-2011-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1471"
},
{
"name": "CVE-2010-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1623"
},
{
"name": "CVE-2011-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3182"
},
{
"name": "CVE-2010-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0734"
},
{
"name": "CVE-2010-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2791"
},
{
"name": "CVE-2011-3268",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3268"
},
{
"name": "CVE-2012-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0135"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2010-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4645"
},
{
"name": "CVE-2010-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2068"
},
{
"name": "CVE-2010-1452",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1452"
},
{
"name": "CVE-2011-3267",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3267"
},
{
"name": "CVE-2010-4409",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4409"
},
{
"name": "CVE-2011-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1148"
},
{
"name": "CVE-2011-1467",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1467"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2012-1993",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1993"
},
{
"name": "CVE-2011-2192",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2192"
},
{
"name": "CVE-2011-3207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3207"
},
{
"name": "CVE-2011-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1470"
},
{
"name": "CVE-2011-1464",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1464"
},
{
"name": "CVE-2011-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3639"
},
{
"name": "CVE-2009-0037",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0037"
},
{
"name": "CVE-2010-3436",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3436"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2011-1945",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1945"
},
{
"name": "CVE-2011-1928",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1928"
},
{
"name": "CVE-2011-3846",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3846"
},
{
"name": "CVE-2011-0014",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0014"
},
{
"name": "CVE-2011-0419",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0419"
},
{
"name": "CVE-2011-1468",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1468"
},
{
"name": "CVE-2011-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1938"
},
{
"name": "CVE-2011-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3189"
}
],
"initial_release_date": "2012-04-18T00:00:00",
"last_revision_date": "2012-04-18T00:00:00",
"links": [],
"reference": "CERTA-2012-AVI-218",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2012-04-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eHP System Management Homepage\u003c/span\u003e. Leur exploitation\npermet, entre autres, d\u0027ex\u00e9cuter du code arbitraire \u00e0 distance et de\nr\u00e9aliser des d\u00e9nis de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans HP System Management Homepage",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 HP c03280632 du 16 avril 2012",
"url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03280632"
}
]
}
GSD-2011-3639
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-3639",
"description": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.",
"id": "GSD-2011-3639",
"references": [
"https://www.suse.com/security/cve/CVE-2011-3639.html",
"https://www.debian.org/security/2012/dsa-2405",
"https://access.redhat.com/errata/RHSA-2012:0323",
"https://access.redhat.com/errata/RHSA-2012:0128",
"https://alas.aws.amazon.com/cve/html/CVE-2011-3639.html",
"https://linux.oracle.com/cve/CVE-2011-3639.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-3639"
],
"details": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.",
"id": "GSD-2011-3639",
"modified": "2023-12-13T01:19:09.984588Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3639",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://rhn.redhat.com/errata/RHSA-2012-0128.html",
"refsource": "MISC",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745",
"refsource": "MISC",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745"
},
{
"name": "http://www.debian.org/security/2012/dsa-2405",
"refsource": "MISC",
"url": "http://www.debian.org/security/2012/dsa-2405"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=752080",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a9:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a7:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a8:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a2:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a5:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a3:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a4:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a6:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server2.0a1:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:http_server:2.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2011-3639"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=752080",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
},
{
"name": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745",
"refsource": "CONFIRM",
"tags": [],
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745"
},
{
"name": "RHSA-2012:0128",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"name": "DSA-2405",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2012/dsa-2405"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2023-02-13T04:32Z",
"publishedDate": "2011-11-30T04:05Z"
}
}
}
FKIE_CVE-2011-3639
Vulnerability from fkie_nvd - Published: 2011-11-30 04:05 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2012-0128.html | ||
| secalert@redhat.com | http://svn.apache.org/viewvc?view=revision&revision=1188745 | ||
| secalert@redhat.com | http://www.debian.org/security/2012/dsa-2405 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=752080 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2012-0128.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://svn.apache.org/viewvc?view=revision&revision=1188745 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2012/dsa-2405 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=752080 |
| Vendor | Product | Version | |
|---|---|---|---|
| apache | http_server | 2.0.11 | |
| apache | http_server | 2.0.12 | |
| apache | http_server | 2.0.13 | |
| apache | http_server | 2.0.14 | |
| apache | http_server | 2.0.15 | |
| apache | http_server | 2.0.16 | |
| apache | http_server | 2.0.17 | |
| apache | http_server | 2.0.18 | |
| apache | http_server | 2.0.19 | |
| apache | http_server | 2.0.20 | |
| apache | http_server | 2.0.21 | |
| apache | http_server | 2.0.22 | |
| apache | http_server | 2.0.23 | |
| apache | http_server | 2.0.24 | |
| apache | http_server | 2.0.25 | |
| apache | http_server | 2.0.26 | |
| apache | http_server | 2.0.27 | |
| apache | http_server | 2.0.28 | |
| apache | http_server | 2.0.29 | |
| apache | http_server | 2.0.30 | |
| apache | http_server | 2.0.31 | |
| apache | http_server | 2.0.32 | |
| apache | http_server | 2.0.33 | |
| apache | http_server | 2.0.34 | |
| apache | http_server | 2.0.35 | |
| apache | http_server | 2.0.36 | |
| apache | http_server | 2.0.37 | |
| apache | http_server | 2.0.38 | |
| apache | http_server | 2.0.39 | |
| apache | http_server | 2.0.40 | |
| apache | http_server | 2.0.41 | |
| apache | http_server | 2.0.42 | |
| apache | http_server | 2.0.43 | |
| apache | http_server | 2.0.44 | |
| apache | http_server | 2.0.45 | |
| apache | http_server | 2.0.46 | |
| apache | http_server | 2.0.47 | |
| apache | http_server | 2.0.48 | |
| apache | http_server | 2.0.49 | |
| apache | http_server | 2.0.50 | |
| apache | http_server | 2.0.51 | |
| apache | http_server | 2.0.52 | |
| apache | http_server | 2.0.53 | |
| apache | http_server | 2.0.54 | |
| apache | http_server | 2.0.55 | |
| apache | http_server | 2.0.56 | |
| apache | http_server | 2.0.57 | |
| apache | http_server | 2.0.58 | |
| apache | http_server | 2.0.59 | |
| apache | http_server | 2.0.61 | |
| apache | http_server | 2.0.63 | |
| apache | http_server | 2.2.0 | |
| apache | http_server | 2.2.1 | |
| apache | http_server | 2.2.2 | |
| apache | http_server | 2.2.3 | |
| apache | http_server | 2.2.4 | |
| apache | http_server | 2.2.6 | |
| apache | http_server | 2.2.8 | |
| apache | http_server | 2.2.9 | |
| apache | http_server | 2.2.10 | |
| apache | http_server | 2.2.11 | |
| apache | http_server | 2.2.12 | |
| apache | http_server | 2.2.13 | |
| apache | http_server | 2.2.14 | |
| apache | http_server | 2.2.15 | |
| apache | http_server | 2.2.16 | |
| apache | http_server | 2.2.17 | |
| apache | http_server2.0a1 | * | |
| apache | http_server2.0a2 | * | |
| apache | http_server2.0a3 | * | |
| apache | http_server2.0a4 | * | |
| apache | http_server2.0a5 | * | |
| apache | http_server2.0a6 | * | |
| apache | http_server2.0a7 | * | |
| apache | http_server2.0a8 | * | |
| apache | http_server2.0a9 | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "DAF992CB-14FF-409B-8DCD-BA967C077DDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "DA66C097-3E40-4B73-814F-DDC0DECED68D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "8AC5F497-E7C4-4C65-AB39-26AC6D9AB16F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "A14055E2-3AF4-4067-B36F-2196A80630AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "877CA12A-4033-4D7A-B952-F03E4A47CDD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "C13C842A-F5C7-463C-AFEF-83CB37DDD143",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "AD5AC2F3-591D-479C-9675-4D805A518B55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "3F4491F3-3444-4FDF-B5BE-2B122E85372D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "DB9F4D77-D462-4ACD-B398-C0B246743436",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.20:*:*:*:*:*:*:*",
"matchCriteriaId": "30815053-E2D2-4D80-A98F-A439A8390DAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.21:*:*:*:*:*:*:*",
"matchCriteriaId": "E1458538-C8F6-4B15-A9BC-A991FB96E58C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.22:*:*:*:*:*:*:*",
"matchCriteriaId": "5625759C-0695-44AD-BF4D-B52C8783CF7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.23:*:*:*:*:*:*:*",
"matchCriteriaId": "0559B21D-AB40-4F99-87DA-0792A198FE9F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.24:*:*:*:*:*:*:*",
"matchCriteriaId": "44C1AC64-7048-4B92-A5EC-1267EB639B97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.25:*:*:*:*:*:*:*",
"matchCriteriaId": "3BC97B2F-08DD-418D-B811-DDD0B886F3B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.26:*:*:*:*:*:*:*",
"matchCriteriaId": "59503E54-2D6E-4116-A54D-857729AEFC4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.27:*:*:*:*:*:*:*",
"matchCriteriaId": "5970F4D6-D6F9-48D9-A720-C0B48946A265",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*",
"matchCriteriaId": "EB477AFB-EA39-4892-B772-586CF6D2D235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.29:*:*:*:*:*:*:*",
"matchCriteriaId": "8FBF3D87-0F47-4EF1-BD1F-3F8AEB54D759",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.30:*:*:*:*:*:*:*",
"matchCriteriaId": "DADE8586-71C7-43E7-92FA-11810376E987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C24F551C-B514-4598-8B17-312F739402D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*",
"matchCriteriaId": "B35906CD-038E-4243-8A95-F0A3A43F06F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.33:*:*:*:*:*:*:*",
"matchCriteriaId": "01BB22DE-1350-41BF-8C3D-B05458A45FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.34:*:*:*:*:*:*:*",
"matchCriteriaId": "BD008916-D0D6-4FC0-AAB0-5A3F11027E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*",
"matchCriteriaId": "B940BB85-03F5-46D7-8DC9-2E1E228D3D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*",
"matchCriteriaId": "82139FFA-2779-4732-AFA5-4E6E19775899",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*",
"matchCriteriaId": "B7F717E6-BACD-4C8A-A9C5-516ADA6FEE6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*",
"matchCriteriaId": "08AB120B-2FEC-4EB3-9777-135D81E809AA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*",
"matchCriteriaId": "1C7FF669-12E0-4A73-BBA7-250D109148C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*",
"matchCriteriaId": "5AB7B1F1-7202-445D-9F96-135DC0AFB1E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*",
"matchCriteriaId": "BCB7EE53-187E-40A9-9865-0F3EDA2B5A4C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*",
"matchCriteriaId": "9D06AE8A-9BA8-4AA8-ACEA-326CD001E879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*",
"matchCriteriaId": "2FC1A04B-0466-48AD-89F3-1F2EF1DEBE6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*",
"matchCriteriaId": "19F34D08-430E-4331-A27D-667149425176",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*",
"matchCriteriaId": "248BDF2C-3E78-49D1-BD9C-60C09A441724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*",
"matchCriteriaId": "BB0FDE3D-1509-4375-8703-0D174D70B22E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*",
"matchCriteriaId": "AFE732B5-00C9-4443-97E0-1DF21475C26B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*",
"matchCriteriaId": "C79C41D3-6894-4F2D-B8F8-82AB4780A824",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*",
"matchCriteriaId": "449A5647-CEA6-4314-9DB8-D086F388E1C7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*",
"matchCriteriaId": "B5A407B7-F432-48F0-916A-A49952F85CA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*",
"matchCriteriaId": "6B5AC769-D07D-43C7-B252-A5A812E7D58C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*",
"matchCriteriaId": "ADF4DBF6-DAF0-47E7-863B-C48DB7149A78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F19D71-0A58-4B03-B351-596EB67ECF80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*",
"matchCriteriaId": "5EBB3FF9-CF5A-4E7B-ACE3-A198343AD485",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*",
"matchCriteriaId": "D721FFB5-D6D3-4F60-8B09-B3AD07EE6D4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*",
"matchCriteriaId": "97E8F32E-C2E5-44E3-A920-F09AF919D372",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF37A82-49B6-45D4-B91D-FDA2D4463A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*",
"matchCriteriaId": "030D1767-2DF7-48E3-B462-4B49CA751B35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*",
"matchCriteriaId": "5236DC61-5557-4C24-8F5B-F48548448588",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*",
"matchCriteriaId": "3B468F9B-2514-425C-9279-0FCAF73BBD18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*",
"matchCriteriaId": "59FAFAD0-6B58-431B-BA90-CAE6C72844E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "67AD11FB-529C-404E-A13B-284F145322B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "733D62FE-180A-4AE8-9DBF-DA1DC18C1932",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "CCBBB7FE-35FC-4515-8393-5145339FCE4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F519633F-AB68-495A-B85E-FD41F9F752CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A894BED6-C97D-4DA4-A13D-9CB2B3306BC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "34A847D1-5AD5-4EFD-B165-7602AFC1E656",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "9AF3A0F5-4E5C-4278-9927-1F94F25CCAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AB63EBE5-CF14-491E-ABA5-67116DFE3E5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "8C2A33DE-F55F-4FD8-BB00-9C1E006CA65C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CF6394-95D9-42AF-A442-385EFF9CEFE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "02B629FB-88C8-4E85-A137-28770F1E524E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*",
"matchCriteriaId": "03550EF0-DF89-42FE-BF0E-994514EBD947",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4886CCAB-6D4E-45C7-B177-2E8DBEA15531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*",
"matchCriteriaId": "C35631AC-7C35-4F6A-A95A-3B080E5210ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*",
"matchCriteriaId": "6CED2BA6-BE5E-4EF1-88EB-0DADD23D2EEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*",
"matchCriteriaId": "A71F4154-AD20-4EEA-9E2E-D3385C357DA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a1:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C46F0F48-193A-4885-9BC0-1BA89829DD6E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a2:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE2712B5-6002-43B8-81D9-4DB00BD3D502",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a3:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74A571A2-3C21-4137-A099-FB50017BE7FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a4:*:*:*:*:*:*:*:*",
"matchCriteriaId": "364B61B1-D841-459A-BDF2-9B5558768A5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a5:*:*:*:*:*:*:*:*",
"matchCriteriaId": "058B5D4F-43A3-4304-A7C3-110E964312BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a6:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0D64BE04-0D98-439D-9E91-E26B466E98E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a7:*:*:*:*:*:*:*:*",
"matchCriteriaId": "38C899A1-550E-435F-A9DC-4F6846CBA2A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a8:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA768FBC-91C7-49AA-8D59-0A853A007135",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:http_server2.0a9:*:*:*:*:*:*:*:*",
"matchCriteriaId": "197CA84D-447E-43B1-B71F-71E92A5937A8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368."
},
{
"lang": "es",
"value": "El m\u00f3dulo mod_proxy en el servidor HTTP Apache v2.0.x hasta v2.0.64 y v2.2.x hasta v2.2.18, cuando la revisi\u00f3n 1179239 se realiza, no interact\u00faa con el uso de patrones de coincidencia (1) RewriteRule y (2) ProxyPassMatch para configuraci\u00f3n de un proxy inverso, lo que permite a atacantes remotos enviar peticiones a servidores de la intranet a trav\u00e9s de URI mal formadas que contienen el caracter \u0027@\u0027: caracter en una posici\u00f3n inv\u00e1lida. NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2011-3368."
}
],
"id": "CVE-2011-3639",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-11-30T04:05:58.437",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"source": "secalert@redhat.com",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2012/dsa-2405"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2012-0128.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://svn.apache.org/viewvc?view=revision\u0026revision=1188745"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2012/dsa-2405"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=752080"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.