Apache Fixes Actively Exploited Web Server Zero-day

'The Apache Software Foundation has released a security patch to address a vulnerability in its HTTP Web Server project that has been actively exploited in the wild. From a report: Tracked as CVE-2021-41773, the vulnerability affects only Apache web servers running version 2.4.49 and occurs because of a bug in how the Apache server converts between different URL path schemes (a process called path or URI normalization). "An attacker could use a path traversal attack to map URLs to files outside the expected document root," the ASF team said in the Apache HTTP Server 2.4.50 changelog. "If files outside of the document root are not protected by 'require all denied' these requests can succeed. Additionally this flaw could leak the source of interpreted files like CGI scripts," Apache engineers added. More than 120,000 servers currently exposed online to attacks.' -- source: https://apache.slashdot.org/story/21/10/05/1538213 Cheers, Peter -- Peter Reutemann Dept. of Computer Science University of Waikato, NZ +64 (7) 858-5174 (office) +64 (7) 577-5304 (home office) http://www.cms.waikato.ac.nz/~fracpete/ http://www.data-mining.co.nz/

On Wed, 6 Oct 2021 12:52:34 +1300, Peter Reutemann quoted:
'> Tracked as CVE-2021-41773, the vulnerability affects only Apache web servers running version 2.4.49...'
Just FYI, Debian 10 ships with 2.4.38, while Debian 11 includes 2.4.48 (just checked a couple of installations). The only place I’ve found 2.4.49 among machines I’m responsible for is an internal one running Debian Unstable.
participants (2)
-
Lawrence D'Oliveiro
-
Peter Reutemann