Note: This bug is displayed in read-only format because
the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
DescriptionPeter Bieringer
2021-10-25 08:38:13 UTC
Can it be that it was overseen that this needs to be fixed also in the "default" error pages?
See
https://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/modules/http/http_protocol.c?r1=1840572&r2=1864207
and related comment
Merge of r1864191 from trunk:
*) core, proxy: remove request URL and headers from error docs (CVE-2019-10092)
[Eric Covener]
Result from pentest against
httpd-2.4.6-97.el7.1.x86_64
$ curl http://EL7-APACHE/this%20site%20is%20not%20working%20now%20please%20go%20to%20https://evil.com____________________%0a____________________________%5E
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN">
<html><head>
<title>404 Not Found</title>
</head><body>
<h1>Not Found</h1>
<p>The requested URL /this site is not working now please go to https:/evil.com____________________
____________________________^ was not found on this server.</p>
</body></html>
+++ This bug was initially created as a clone of Bug #1743956 +++
A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed.
--- Additional comment from Dhananjay Arunesh on 2019-08-21 05:06:00 UTC ---
Created httpd tracking bugs for this issue:
Affects: fedora-all [bug 1743957]
--- Additional comment from Dhananjay Arunesh on 2019-08-21 06:25:28 UTC ---
External References:
https://httpd.apache.org/security/vulnerabilities_24.html
--- Additional comment from Joshua Padman on 2019-08-28 12:16:17 UTC ---
This vulnerability is out of security support scope for the following product:
* Red Hat JBoss Web Server 3
* Red Hat JBoss Enterprise Web Server 2
Please refer to https://access.redhat.com/support/policy/updates/jboss_notes for more details.
--- Additional comment from Doran Moppert on 2019-09-04 03:31:35 UTC ---
Mitigation:
This flaw is only exploitable if Proxy* directives are used in Apache httpd configuration. The following command can be used to search for possible vulnerable configurations:
grep -R '^\s*Proxy' /etc/httpd/
See https://httpd.apache.org/docs/2.4/mod/mod_proxy.html
--- Additional comment from errata-xmlrpc on 2019-12-10 07:57:21 UTC ---
This issue has been addressed in the following products:
Red Hat Software Collections for Red Hat Enterprise Linux 6
Red Hat Software Collections for Red Hat Enterprise Linux 7
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS
Red Hat Software Collections for Red Hat Enterprise Linux 7.5 EUS
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS
Via RHSA-2019:4126 https://access.redhat.com/errata/RHSA-2019:4126
--- Additional comment from Product Security DevOps Team on 2019-12-10 13:24:01 UTC ---
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):
https://access.redhat.com/security/cve/cve-2019-10092
--- Additional comment from errata-xmlrpc on 2020-04-06 19:10:08 UTC ---
This issue has been addressed in the following products:
JBoss Core Services Apache HTTP Server 2.4.37 SP2
Via RHSA-2020:1336 https://access.redhat.com/errata/RHSA-2020:1336
--- Additional comment from errata-xmlrpc on 2020-04-06 19:26:50 UTC ---
This issue has been addressed in the following products:
JBoss Core Services on RHEL 6
JBoss Core Services on RHEL 7
Via RHSA-2020:1337 https://access.redhat.com/errata/RHSA-2020:1337
--- Additional comment from errata-xmlrpc on 2020-11-04 03:35:10 UTC ---
This issue has been addressed in the following products:
Red Hat Enterprise Linux 8
Via RHSA-2020:4751 https://access.redhat.com/errata/RHSA-2020:4751
The upstream commit addressing CVE-2019-10092:
https://svn.apache.org/viewvc?view=revision&revision=1864207
also removed the reflected URLs from the core canned error responses, though I'm not sure that was strictly necessary to fix the XSS in the proxy error path.
Regardless, that part of the patch was included when we fixed CVE-2019-10092 for RHEL8 httpd. CVE-2019-10092 is not addressed in RHEL7 because it is rated as Low severity.
*** This bug has been marked as a duplicate of bug 1747280 ***