Bug 2161777 (CVE-2022-36760) - CVE-2022-36760 httpd: mod_proxy_ajp: Possible request smuggling
Summary: CVE-2022-36760 httpd: mod_proxy_ajp: Possible request smuggling
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2022-36760
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2162100 2162509 2162510 2162511 2165974 2165978
Blocks: 2161771
TreeView+ depends on / blocked
 
Reported: 2023-01-17 20:59 UTC by Zack Miele
Modified: 2024-10-30 11:01 UTC (History)
49 users (show)

Fixed In Version: httpd 2.4.55
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the mod_proxy_ajp module of httpd. The connection is not closed when there is an invalid Transfer-Encoding header, allowing an attacker to smuggle requests to the AJP server, where it forwards requests.
Clone Of:
Environment:
Last Closed: 2023-02-28 12:44:26 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:0852 0 None None None 2023-02-21 09:32:10 UTC
Red Hat Product Errata RHSA-2023:0970 0 None None None 2023-02-28 08:20:59 UTC
Red Hat Product Errata RHSA-2023:4628 0 None None None 2023-08-15 17:37:14 UTC
Red Hat Product Errata RHSA-2023:4629 0 None None None 2023-08-15 17:40:48 UTC

Description Zack Miele 2023-01-17 20:59:35 UTC
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.

References:
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.openwall.com/lists/oss-security/2023/01/17/6

Comment 1 Guilherme de Almeida Suckevicz 2023-01-18 19:02:35 UTC
Created httpd tracking bugs for this issue:

Affects: fedora-all [bug 2162100]

Comment 5 Joe Orton 2023-01-20 13:00:58 UTC
Upstream fix is: https://svn.apache.org/viewvc?view=revision&revision=1906540

Comment 12 errata-xmlrpc 2023-02-21 09:32:07 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:0852 https://access.redhat.com/errata/RHSA-2023:0852

Comment 13 errata-xmlrpc 2023-02-28 08:20:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:0970 https://access.redhat.com/errata/RHSA-2023:0970

Comment 14 Product Security DevOps Team 2023-02-28 12:44:22 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2022-36760

Comment 15 errata-xmlrpc 2023-08-15 17:37:11 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Core Services

Via RHSA-2023:4628 https://access.redhat.com/errata/RHSA-2023:4628

Comment 16 errata-xmlrpc 2023-08-15 17:40:44 UTC
This issue has been addressed in the following products:

  JBoss Core Services on RHEL 7
  JBoss Core Services for RHEL 8

Via RHSA-2023:4629 https://access.redhat.com/errata/RHSA-2023:4629


Note You need to log in before you can comment on or make changes to this bug.