Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Nov 2023, 03:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-06-10 07:15
Updated : 2024-06-10 17:16
NVD link : CVE-2019-17567
Mitre link : CVE-2019-17567
CVE.ORG link : CVE-2019-17567
JSON object : View
Products Affected
oracle
- enterprise_manager_ops_center
- zfs_storage_appliance_kit
- instantis_enterprisetrack
apache
- http_server
fedoraproject
- fedora
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')