Lucene search

K
threatpostBrian PrinceTHREATPOST:0413CB7CEB3A83FB6F02DBDDD013A75E
HistoryNov 26, 2011 - 11:41 p.m.

New Apache Reverse Proxy Issue Uncovered

2011-11-2623:41:49
Brian Prince
threatpost.com
26

0.974 High

EPSS

Percentile

99.9%

ApacheA new reverse proxy issue affecting Apache HTTP server can be used by attackers to access internal systems if certain rules are improperly configured, a security researcher said.

Prutha Parikh, vulnerability signature engineer at Qualys, blogged that she uncovered the issue while creating a QualysGuard vulnerability signature for another reverse proxy issue, detailed in CVE-2011-3368. While reviewing the patch for the older bug, she discovered it was still possible to use a crafted request to exploit a fully-patched Apache Web Server.

In the proof-of-concept demonstrations detailed here in her blog post, Parikh outlined two examples where an Apache Web Server (version 2.2.21) with the CVE-2011-3368 patch applied, a reverse proxy set up and incorrectly configured RewriteRule/ProxyPassMatch rules could be compromised by an attacker looking to circumvent security mechanisms.

β€œThe patch for CVE-2011-3368 is straight forward and self explanatory,” she blogged. β€œThe β€œserver/protocol.c” file was modified. The patch looks at the request being sent and returns a HTTP 400 Response (Bad Request) if the URL does not begin with a forward slash β€œ/”.”

β€œThis part of the code takes care of the issue for CVE-2011-3368,” she continued.

However, a closer analysis of the patch reveals it does not process URIs (uniform resource identifiers) that have a scheme, she added.

As a result, β€œif a malformed URL request with a scheme was constructed, it would still be possible to bypass security and gain access to systems on the internal server provided that the reverse proxy rules were incorrectly configured,” she wrote.

Apache developers are working on a fix to address the issue.