{"schema_version":"1.7.2","id":"OESA-2024-1830","modified":"2024-07-12T11:08:29Z","published":"2024-07-12T11:08:29Z","upstream":["CVE-2024-38475","CVE-2024-39573"],"summary":"httpd security update","details":"Apache HTTP Server is a powerful and flexible HTTP/1.1 compliant web server.\n\nSecurity Fix(es):\n\nImproper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. \n\nSubstitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag \u0026quot;UnsafePrefixStat\u0026quot; can be used to opt back in once ensuring the substitution is appropriately constrained.(CVE-2024-38475)\n\nPotential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL\u0026apos;s to be handled by mod_proxy.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.(CVE-2024-39573)","affected":[{"package":{"ecosystem":"openEuler:22.03-LTS-SP4","name":"httpd","purl":"pkg:rpm/openEuler/httpd\u0026distro=openEuler-22.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.51-22.oe2203sp4"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.51-22.oe2203sp4.aarch64.rpm","httpd-debuginfo-2.4.51-22.oe2203sp4.aarch64.rpm","httpd-debugsource-2.4.51-22.oe2203sp4.aarch64.rpm","httpd-devel-2.4.51-22.oe2203sp4.aarch64.rpm","httpd-tools-2.4.51-22.oe2203sp4.aarch64.rpm","mod_ldap-2.4.51-22.oe2203sp4.aarch64.rpm","mod_md-2.4.51-22.oe2203sp4.aarch64.rpm","mod_proxy_html-2.4.51-22.oe2203sp4.aarch64.rpm","mod_session-2.4.51-22.oe2203sp4.aarch64.rpm","mod_ssl-2.4.51-22.oe2203sp4.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.51-22.oe2203sp4.noarch.rpm","httpd-help-2.4.51-22.oe2203sp4.noarch.rpm"],"src":["httpd-2.4.51-22.oe2203sp4.src.rpm"],"x86_64":["httpd-2.4.51-22.oe2203sp4.x86_64.rpm","httpd-debuginfo-2.4.51-22.oe2203sp4.x86_64.rpm","httpd-debugsource-2.4.51-22.oe2203sp4.x86_64.rpm","httpd-devel-2.4.51-22.oe2203sp4.x86_64.rpm","httpd-tools-2.4.51-22.oe2203sp4.x86_64.rpm","mod_ldap-2.4.51-22.oe2203sp4.x86_64.rpm","mod_md-2.4.51-22.oe2203sp4.x86_64.rpm","mod_proxy_html-2.4.51-22.oe2203sp4.x86_64.rpm","mod_session-2.4.51-22.oe2203sp4.x86_64.rpm","mod_ssl-2.4.51-22.oe2203sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP1","name":"httpd","purl":"pkg:rpm/openEuler/httpd\u0026distro=openEuler-22.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.51-22.oe2203sp1"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.51-22.oe2203sp1.aarch64.rpm","httpd-debuginfo-2.4.51-22.oe2203sp1.aarch64.rpm","httpd-debugsource-2.4.51-22.oe2203sp1.aarch64.rpm","httpd-devel-2.4.51-22.oe2203sp1.aarch64.rpm","httpd-tools-2.4.51-22.oe2203sp1.aarch64.rpm","mod_ldap-2.4.51-22.oe2203sp1.aarch64.rpm","mod_md-2.4.51-22.oe2203sp1.aarch64.rpm","mod_proxy_html-2.4.51-22.oe2203sp1.aarch64.rpm","mod_session-2.4.51-22.oe2203sp1.aarch64.rpm","mod_ssl-2.4.51-22.oe2203sp1.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.51-22.oe2203sp1.noarch.rpm","httpd-help-2.4.51-22.oe2203sp1.noarch.rpm"],"src":["httpd-2.4.51-22.oe2203sp1.src.rpm"],"x86_64":["httpd-2.4.51-22.oe2203sp1.x86_64.rpm","httpd-debuginfo-2.4.51-22.oe2203sp1.x86_64.rpm","httpd-debugsource-2.4.51-22.oe2203sp1.x86_64.rpm","httpd-devel-2.4.51-22.oe2203sp1.x86_64.rpm","httpd-tools-2.4.51-22.oe2203sp1.x86_64.rpm","mod_ldap-2.4.51-22.oe2203sp1.x86_64.rpm","mod_md-2.4.51-22.oe2203sp1.x86_64.rpm","mod_proxy_html-2.4.51-22.oe2203sp1.x86_64.rpm","mod_session-2.4.51-22.oe2203sp1.x86_64.rpm","mod_ssl-2.4.51-22.oe2203sp1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP4","name":"httpd","purl":"pkg:rpm/openEuler/httpd\u0026distro=openEuler-20.03-LTS-SP4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.43-25.oe2003sp4"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.43-25.oe2003sp4.aarch64.rpm","httpd-debuginfo-2.4.43-25.oe2003sp4.aarch64.rpm","httpd-debugsource-2.4.43-25.oe2003sp4.aarch64.rpm","httpd-devel-2.4.43-25.oe2003sp4.aarch64.rpm","httpd-tools-2.4.43-25.oe2003sp4.aarch64.rpm","mod_ldap-2.4.43-25.oe2003sp4.aarch64.rpm","mod_md-2.4.43-25.oe2003sp4.aarch64.rpm","mod_proxy_html-2.4.43-25.oe2003sp4.aarch64.rpm","mod_session-2.4.43-25.oe2003sp4.aarch64.rpm","mod_ssl-2.4.43-25.oe2003sp4.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.43-25.oe2003sp4.noarch.rpm","httpd-help-2.4.43-25.oe2003sp4.noarch.rpm"],"src":["httpd-2.4.43-25.oe2003sp4.src.rpm"],"x86_64":["httpd-2.4.43-25.oe2003sp4.x86_64.rpm","httpd-debuginfo-2.4.43-25.oe2003sp4.x86_64.rpm","httpd-debugsource-2.4.43-25.oe2003sp4.x86_64.rpm","httpd-devel-2.4.43-25.oe2003sp4.x86_64.rpm","httpd-tools-2.4.43-25.oe2003sp4.x86_64.rpm","mod_ldap-2.4.43-25.oe2003sp4.x86_64.rpm","mod_md-2.4.43-25.oe2003sp4.x86_64.rpm","mod_proxy_html-2.4.43-25.oe2003sp4.x86_64.rpm","mod_session-2.4.43-25.oe2003sp4.x86_64.rpm","mod_ssl-2.4.43-25.oe2003sp4.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:24.03-LTS","name":"httpd","purl":"pkg:rpm/openEuler/httpd\u0026distro=openEuler-24.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.58-6.oe2403"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.58-6.oe2403.aarch64.rpm","httpd-debuginfo-2.4.58-6.oe2403.aarch64.rpm","httpd-debugsource-2.4.58-6.oe2403.aarch64.rpm","httpd-devel-2.4.58-6.oe2403.aarch64.rpm","httpd-tools-2.4.58-6.oe2403.aarch64.rpm","mod_ldap-2.4.58-6.oe2403.aarch64.rpm","mod_md-2.4.58-6.oe2403.aarch64.rpm","mod_proxy_html-2.4.58-6.oe2403.aarch64.rpm","mod_session-2.4.58-6.oe2403.aarch64.rpm","mod_ssl-2.4.58-6.oe2403.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.58-6.oe2403.noarch.rpm","httpd-help-2.4.58-6.oe2403.noarch.rpm"],"src":["httpd-2.4.58-6.oe2403.src.rpm"],"x86_64":["httpd-2.4.58-6.oe2403.x86_64.rpm","httpd-debuginfo-2.4.58-6.oe2403.x86_64.rpm","httpd-debugsource-2.4.58-6.oe2403.x86_64.rpm","httpd-devel-2.4.58-6.oe2403.x86_64.rpm","httpd-tools-2.4.58-6.oe2403.x86_64.rpm","mod_ldap-2.4.58-6.oe2403.x86_64.rpm","mod_md-2.4.58-6.oe2403.x86_64.rpm","mod_proxy_html-2.4.58-6.oe2403.x86_64.rpm","mod_session-2.4.58-6.oe2403.x86_64.rpm","mod_ssl-2.4.58-6.oe2403.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS-SP3","name":"httpd","purl":"pkg:rpm/openEuler/httpd\u0026distro=openEuler-22.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.4.51-22.oe2203sp3"}]}],"ecosystem_specific":{"aarch64":["httpd-2.4.51-22.oe2203sp3.aarch64.rpm","httpd-debuginfo-2.4.51-22.oe2203sp3.aarch64.rpm","httpd-debugsource-2.4.51-22.oe2203sp3.aarch64.rpm","httpd-devel-2.4.51-22.oe2203sp3.aarch64.rpm","httpd-tools-2.4.51-22.oe2203sp3.aarch64.rpm","mod_ldap-2.4.51-22.oe2203sp3.aarch64.rpm","mod_md-2.4.51-22.oe2203sp3.aarch64.rpm","mod_proxy_html-2.4.51-22.oe2203sp3.aarch64.rpm","mod_session-2.4.51-22.oe2203sp3.aarch64.rpm","mod_ssl-2.4.51-22.oe2203sp3.aarch64.rpm"],"noarch":["httpd-filesystem-2.4.51-22.oe2203sp3.noarch.rpm","httpd-help-2.4.51-22.oe2203sp3.noarch.rpm"],"src":["httpd-2.4.51-22.oe2203sp3.src.rpm"],"x86_64":["httpd-2.4.51-22.oe2203sp3.x86_64.rpm","httpd-debuginfo-2.4.51-22.oe2203sp3.x86_64.rpm","httpd-debugsource-2.4.51-22.oe2203sp3.x86_64.rpm","httpd-devel-2.4.51-22.oe2203sp3.x86_64.rpm","httpd-tools-2.4.51-22.oe2203sp3.x86_64.rpm","mod_ldap-2.4.51-22.oe2203sp3.x86_64.rpm","mod_md-2.4.51-22.oe2203sp3.x86_64.rpm","mod_proxy_html-2.4.51-22.oe2203sp3.x86_64.rpm","mod_session-2.4.51-22.oe2203sp3.x86_64.rpm","mod_ssl-2.4.51-22.oe2203sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1830"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38475"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-39573"}],"database_specific":{"severity":"Critical"}}