低危 Apache HTTP Server 环境问题漏洞
CVE编号
CVE-2020-9490利用情况
暂无补丁情况
官方补丁披露时间
2020-08-08漏洞描述
Apache HTTP Server是美国阿帕奇软件(Apache Software)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.20版本至2.4.43版本中存在安全漏洞,攻击者可借助‘Cache-Digest’标头中带有特制值的HTTP/2请求利用该漏洞造成Push Diary崩溃。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:https://httpd.apache.org/security/vulnerabilities_24.html受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | apache | http_server | * | From (including) 2.4.20 | Up to (excluding) 2.4.46 | ||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.9 | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | apache2 | * | Up to (excluding) 2.4.46-r0 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | httpd | * | Up to (excluding) 1.15.14-2.amzn2 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | httpd24 | * | Up to (excluding) 2.4.46-1.90.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | mod_http2 | * | Up to (excluding) 2.4.37-21.0.1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8.2 | mod_ldap | * | Up to (excluding) 2.4.37-21.0.1 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | httpd-debugsource | * | Up to (excluding) 2.4.37-21.module+el8.2.0+5008+cca404a3 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | apache2 | * | Up to (excluding) 2.4.38-3+deb10u4 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | apache2 | * | Up to (excluding) 2.4.46-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | apache2 | * | Up to (excluding) 2.4.46-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_9 | apache2 | * | Up to (including) 2.4.25-3+deb9u9 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | apache2 | * | Up to (excluding) 2.4.46-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_31 | mod_http2-debuginfo | * | Up to (excluding) 1.15.14-1.fc31 | |||||
运行在以下环境 | |||||||||
系统 | fedora_32 | mod_http2-debuginfo | * | Up to (excluding) 1.15.14-1.fc32 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_aarch64_V10SP1 | httpd | * | Up to (excluding) 2.4.43-8.p01.ky10 | |||||
运行在以下环境 | |||||||||
系统 | kylinos_x86_64_V10SP1 | httpd | * | Up to (excluding) 2.4.43-8.p01.ky10 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | apache2-event | * | Up to (excluding) 2.4.33-lp151.8.15.1 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | apache2-event | * | Up to (excluding) 2.4.43-lp152.2.3.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 2.4.37-21.0.1.module+el8.2.0+5576+c083ffcb | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | httpd-debugsource | * | Up to (excluding) 2.4.37-21.module+el8.2.0+5008+cca404a3 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | apache2-example-pages | * | Up to (excluding) 2.4.23-29.63.1 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | apache2 | * | Up to (excluding) 2.4.29-1ubuntu4.14 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | apache2 | * | Up to (excluding) 2.4.29-1ubuntu4.14 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_20.04 | apache2 | * | Up to (excluding) 2.4.41-4ubuntu3.1 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
CWE-ID | 漏洞类型 |
CWE-444 | HTTP请求的解释不一致性(HTTP请求私运) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论