漏洞信息详情
Apache HTTP Server 代码问题漏洞
漏洞简介
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。
Apache HTTP Server存在代码问题漏洞,该漏洞是由于系统对用户的输入没有进行严格的过滤导致,攻击者可以构造恶意数据对目标服务器进行SSRF攻击。该漏洞可做为攻击目标服务器内网的跳板,以此对服务器所在内网进行端口扫描、攻击运行在内网的应用程序、下载内网资源等。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://access.redhat.com/security/cve/cve-2021-40438
参考网址
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/10/msg00001.html
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/SPBR6WUYBJNACHKE65SPL7TJOHX7RHWD/
来源:httpd.apache.org%3E
链接:httpd.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.html/r2eb200ac1340f69aa22af61ab34780c531d110437910cb9c0ece3b37@%3Cbugs.
来源:MLIST
链接:https://lists.apache.org/thread.html/rf6954e60b1c8e480678ce3d02f61b8a788997785652e9557a3265c00@%3Cusers.
来源:MLIST
链接:https://lists.apache.org/thread.html/r82c077663f9759c7df5a6656f925b3ee4f55fcd33c889ba7cd687029@%3Cusers.
来源:FEDORA
链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/ZNCYSR3BXT36FFF4XTCPL3HDQK4VP45R/
来源:httpd-2.4.49-VWL69sWQ
链接:httpd-2.4.49-VWL69sWQ
来源:CISCO
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-
来源:DEBIAN
链接:https://www.debian.org/security/2021/dsa-4982
来源:MLIST
链接:https://lists.apache.org/thread.html/r210807d0bb55f4aa6fbe1512be6bcc4dacd64e84940429fba329967a@%3Cusers.
来源:CONFIRM
链接:https://www.tenable.com/security/tns-2021-17
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20211008-0004/
来源:MLIST
链接:https://lists.apache.org/thread.html/r82838efc5fa6fc4c73986399c9b71573589f78b31846aff5bd9b1697@%3Cusers.
来源:MLIST
链接:https://lists.apache.org/thread.html/r61fdbfc26ab170f4e6492ef3bd5197c20b862ce156e9d5a54d4b899c@%3Cusers.
来源:httpd.apache.org
链接:httpd.apache.org/security/vulnerabilities_24.html
来源:MLIST
链接:https://lists.apache.org/thread.html/r3925e167d5eb1c75def3750c155d753064e1d34a143028bb32910432@%3Cusers.
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164505/Red-Hat-Security-Advisory-2021-3836-01.html
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021101906
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3229
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021112904
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3524
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021111732
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3429
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164448/Red-Hat-Security-Advisory-2021-3746-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3373
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3357
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3250
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3591
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021102601
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021101116
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164318/Ubuntu-Security-Notice-USN-5090-3.html
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6520016
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164460/Red-Hat-Security-Advisory-2021-3754-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.4004.3
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.4004.2
来源:www.ibm.com
链接:https://www.ibm.com/support/pages/node/6493841
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021092301
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3387
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3341
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021101922
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164329/Ubuntu-Security-Notice-USN-5090-4.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3148
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/164513/Red-Hat-Security-Advisory-2021-3856-01.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3366
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3784
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021101340
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-40438
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021091707
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apache-HTTP-Server-four-vulnerabilities-36444
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.3482
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021101005
受影响实体
暂无
补丁
- Apache HTTP Server 代码问题漏洞的修复措施<!--2021-9-16-->
还没有评论,来说两句吧...