httpd is vulnerable to open redirection. The mod_rewrite configurations is vulnerable to open redirect due to lack of validation in the URL.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | mod_cluster | 1.3.12_9.final_redhat_2.jbcs.el7 | cpe:2.3:a:redhat:mod_cluster:1.3.12_9.final_redhat_2.jbcs.el7:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.5_13.final_redhat_1.jbcs.el6 | cpe:2.3:a:redhat:mod_cluster:1.3.5_13.final_redhat_1.jbcs.el6:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.1_10.final_redhat_2.jbcs.el6 | cpe:2.3:a:redhat:mod_cluster:1.3.1_10.final_redhat_2.jbcs.el6:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.12_13.final_redhat_2.jbcs.el6 | cpe:2.3:a:redhat:mod_cluster:1.3.12_13.final_redhat_2.jbcs.el6:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.1_10.final_redhat_2.jbcs.el7 | cpe:2.3:a:redhat:mod_cluster:1.3.1_10.final_redhat_2.jbcs.el7:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.8_3.final_redhat_2.jbcs.el7 | cpe:2.3:a:redhat:mod_cluster:1.3.8_3.final_redhat_2.jbcs.el7:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.8_1.final_redhat_1.jbcs.el7 | cpe:2.3:a:redhat:mod_cluster:1.3.8_1.final_redhat_1.jbcs.el7:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.8_1.final_redhat_2.jbcs.el7 | cpe:2.3:a:redhat:mod_cluster:1.3.8_1.final_redhat_2.jbcs.el7:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.8_1.final_redhat_2.jbcs.el6 | cpe:2.3:a:redhat:mod_cluster:1.3.8_1.final_redhat_2.jbcs.el6:*:*:*:*:*:*:* |
redhat | mod_cluster | 1.3.12_9.final_redhat_2.jbcs.el6 | cpe:2.3:a:redhat:mod_cluster:1.3.12_9.final_redhat_2.jbcs.el6:*:*:*:*:*:*:* |
lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
www.openwall.com/lists/oss-security/2020/04/03/1
www.openwall.com/lists/oss-security/2020/04/04/1
access.redhat.com/documentation/en-us/red_hat_jboss_core_services/2.4.37/
access.redhat.com/errata/RHSA-2020:1337
access.redhat.com/security/updates/classification/#moderate
httpd.apache.org/security/vulnerabilities_24.html
lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac@%3Cdev.httpd.apache.org%3E
lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201@%3Cdev.httpd.apache.org%3E
lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce@%3Ccvs.httpd.apache.org%3E
lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
lists.debian.org/debian-lts-announce/2021/07/msg00006.html
lists.fedoraproject.org/archives/list/[email protected]/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/
lists.fedoraproject.org/archives/list/[email protected]/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/
security.netapp.com/advisory/ntap-20200413-0002/
usn.ubuntu.com/4458-1/
www.debian.org/security/2020/dsa-4757
www.oracle.com/security-alerts/cpuApr2021.html
www.oracle.com/security-alerts/cpujul2020.html
www.oracle.com/security-alerts/cpujul2022.html