Lucene search

K
nvd[email protected]NVD:CVE-2011-3639
HistoryNov 30, 2011 - 4:05 a.m.

CVE-2011-3639

2011-11-3004:05:58
CWE-20
web.nvd.nist.gov

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

8.8 High

AI Score

Confidence

High

0.974 High

EPSS

Percentile

99.9%

The mod_proxy module in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x before 2.2.18, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers by using the HTTP/0.9 protocol with a malformed URI containing an initial @ (at sign) character. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368.

Affected configurations

NVD
Node
apachehttp_serverMatch2.0.11
OR
apachehttp_serverMatch2.0.12
OR
apachehttp_serverMatch2.0.13
OR
apachehttp_serverMatch2.0.14
OR
apachehttp_serverMatch2.0.15
OR
apachehttp_serverMatch2.0.16
OR
apachehttp_serverMatch2.0.17
OR
apachehttp_serverMatch2.0.18
OR
apachehttp_serverMatch2.0.19
OR
apachehttp_serverMatch2.0.20
OR
apachehttp_serverMatch2.0.21
OR
apachehttp_serverMatch2.0.22
OR
apachehttp_serverMatch2.0.23
OR
apachehttp_serverMatch2.0.24
OR
apachehttp_serverMatch2.0.25
OR
apachehttp_serverMatch2.0.26
OR
apachehttp_serverMatch2.0.27
OR
apachehttp_serverMatch2.0.28
OR
apachehttp_serverMatch2.0.29
OR
apachehttp_serverMatch2.0.30
OR
apachehttp_serverMatch2.0.31
OR
apachehttp_serverMatch2.0.32
OR
apachehttp_serverMatch2.0.33
OR
apachehttp_serverMatch2.0.34
OR
apachehttp_serverMatch2.0.35
OR
apachehttp_serverMatch2.0.36
OR
apachehttp_serverMatch2.0.37
OR
apachehttp_serverMatch2.0.38
OR
apachehttp_serverMatch2.0.39
OR
apachehttp_serverMatch2.0.40
OR
apachehttp_serverMatch2.0.41
OR
apachehttp_serverMatch2.0.42
OR
apachehttp_serverMatch2.0.43
OR
apachehttp_serverMatch2.0.44
OR
apachehttp_serverMatch2.0.45
OR
apachehttp_serverMatch2.0.46
OR
apachehttp_serverMatch2.0.47
OR
apachehttp_serverMatch2.0.48
OR
apachehttp_serverMatch2.0.49
OR
apachehttp_serverMatch2.0.50
OR
apachehttp_serverMatch2.0.51
OR
apachehttp_serverMatch2.0.52
OR
apachehttp_serverMatch2.0.53
OR
apachehttp_serverMatch2.0.54
OR
apachehttp_serverMatch2.0.55
OR
apachehttp_serverMatch2.0.56
OR
apachehttp_serverMatch2.0.57
OR
apachehttp_serverMatch2.0.58
OR
apachehttp_serverMatch2.0.59
OR
apachehttp_serverMatch2.0.61
OR
apachehttp_serverMatch2.0.63
OR
apachehttp_serverMatch2.2.0
OR
apachehttp_serverMatch2.2.1
OR
apachehttp_serverMatch2.2.2
OR
apachehttp_serverMatch2.2.3
OR
apachehttp_serverMatch2.2.4
OR
apachehttp_serverMatch2.2.6
OR
apachehttp_serverMatch2.2.8
OR
apachehttp_serverMatch2.2.9
OR
apachehttp_serverMatch2.2.10
OR
apachehttp_serverMatch2.2.11
OR
apachehttp_serverMatch2.2.12
OR
apachehttp_serverMatch2.2.13
OR
apachehttp_serverMatch2.2.14
OR
apachehttp_serverMatch2.2.15
OR
apachehttp_serverMatch2.2.16
OR
apachehttp_serverMatch2.2.17
OR
apachehttp_server2.0a1
OR
apachehttp_server2.0a2
OR
apachehttp_server2.0a3
OR
apachehttp_server2.0a4
OR
apachehttp_server2.0a5
OR
apachehttp_server2.0a6
OR
apachehttp_server2.0a7
OR
apachehttp_server2.0a8
OR
apachehttp_server2.0a9

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

8.8 High

AI Score

Confidence

High

0.974 High

EPSS

Percentile

99.9%