Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
{ "priority_reason": "This CVE is in the CISA KEV", "ubuntu_priority": "high", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-bin", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-bin-dbgsym", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-data", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-dbg", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-dbgsym", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-dev", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-dev-dbgsym", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-doc", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-suexec-custom-dbgsym", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-suexec-pristine-dbgsym", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-utils", "binary_version": "2.4.18-2ubuntu3.17+esm13" }, { "binary_name": "apache2-utils-dbgsym", "binary_version": "2.4.18-2ubuntu3.17+esm13" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "This CVE is in the CISA KEV", "ubuntu_priority": "high", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-bin", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-data", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-dbg", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-dev", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-doc", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-ssl-dev", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.29-1ubuntu4.27+esm3" }, { "binary_name": "apache2-utils", "binary_version": "2.4.29-1ubuntu4.27+esm3" } ], "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro" }
{ "priority_reason": "This CVE is in the CISA KEV", "ubuntu_priority": "high", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-bin", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-bin-dbgsym", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-data", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-dev", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-doc", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-ssl-dev", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-suexec-custom-dbgsym", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-suexec-pristine-dbgsym", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-utils", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "apache2-utils-dbgsym", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "libapache2-mod-md", "binary_version": "2.4.41-4ubuntu3.19" }, { "binary_name": "libapache2-mod-proxy-uwsgi", "binary_version": "2.4.41-4ubuntu3.19" } ], "availability": "No subscription required" }
{ "priority_reason": "This CVE is in the CISA KEV", "ubuntu_priority": "high", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-bin", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-bin-dbgsym", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-data", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-dev", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-doc", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-ssl-dev", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-suexec-custom-dbgsym", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-suexec-pristine-dbgsym", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-utils", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "apache2-utils-dbgsym", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "libapache2-mod-md", "binary_version": "2.4.52-1ubuntu4.10" }, { "binary_name": "libapache2-mod-proxy-uwsgi", "binary_version": "2.4.52-1ubuntu4.10" } ], "availability": "No subscription required" }
{ "priority_reason": "This CVE is in the CISA KEV", "ubuntu_priority": "high", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-bin", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-bin-dbgsym", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-data", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-dev", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-doc", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-ssl-dev", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-custom-dbgsym", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-pristine-dbgsym", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-utils", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-utils-dbgsym", "binary_version": "2.4.62-1ubuntu1" } ], "availability": "No subscription required" }
{ "priority_reason": "This CVE is in the CISA KEV", "ubuntu_priority": "high", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-bin", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-bin-dbgsym", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-data", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-dev", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-doc", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-ssl-dev", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-suexec-custom-dbgsym", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-suexec-pristine-dbgsym", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-utils", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "apache2-utils-dbgsym", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "libapache2-mod-md", "binary_version": "2.4.58-1ubuntu8.2" }, { "binary_name": "libapache2-mod-proxy-uwsgi", "binary_version": "2.4.58-1ubuntu8.2" } ], "availability": "No subscription required" }
{ "priority_reason": "This CVE is in the CISA KEV", "ubuntu_priority": "high", "binaries": [ { "binary_name": "apache2", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-bin", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-bin-dbgsym", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-data", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-dev", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-doc", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-ssl-dev", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-custom", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-custom-dbgsym", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-pristine", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-suexec-pristine-dbgsym", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-utils", "binary_version": "2.4.62-1ubuntu1" }, { "binary_name": "apache2-utils-dbgsym", "binary_version": "2.4.62-1ubuntu1" } ], "availability": "No subscription required" }