Description
The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2405-1 | apache2 security update |
References
History
No history.
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Http Server2.0a1
Subscribe
Http Server2.0a2
Subscribe
Http Server2.0a3
Subscribe
Http Server2.0a4
Subscribe
Http Server2.0a5
Subscribe
Http Server2.0a6
Subscribe
Http Server2.0a7
Subscribe
Http Server2.0a8
Subscribe
Http Server2.0a9
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:37:48.644Z
Reserved: 2011-09-21T00:00:00.000Z
Link: CVE-2011-3639
No data.
Status : Modified
Published: 2011-11-30T04:05:58.437
Modified: 2026-04-29T01:13:23.040
Link: CVE-2011-3639
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA