Apache Vulnerability for Rewriting X-REAL-IP Header (CVE-2022-24112)

admin 2 2025-01-13 编辑

Apache  Vulnerability for Rewriting X-REAL-IP Header (CVE-2022-24112)

In versions prior to Apache 2.12.1, there is a risk of rewriting X-REAL-IP header after enabling the Apache batch-requests plug-in. Now the processing information will be announced.

Problem Description​

In versions of Apache prior to 2.12.1 (excluding 2.12.1 and 2.10.4), there is a risk of rewriting the X-REAL-IP header when the Apache batch-requests plugin is enabled.

This risk leads to two problems:

  • An attacker bypasses the IP restrictions on the Apache data plane via the batch-requests plugin. For example, bypassing IP black and white list restrictions.
  • If the user uses the default Apache configuration (Admin API enabled, with the default Admin Key and no additional admin port assigned), an attacker can invoke the Admin API via the batch-requests plug-in.

Affected Versions​

  • All versions of Apache between 1.3 ~ 2.12.1 (excluding 2.12.1)
  • All LTS versions of Apache between 2.10.0 ~ 2.10.4 (excluding 2.10.4)

Solution​

  • This issue has been resolved in versions 2.12.1 and 2.10.4, please update to the relevant version as soon as possible.
  • In affected versions of Apache , you can avoid this risk by explicitly commenting out batch-requests in the conf/config.yaml and conf/config-default.yaml files and restarting Apache .

Vulnerability details​

Severity:High

Vulnerability public date: February 11, 2022

CVE details: https://nvd.nist.gov/vuln/detail/CVE-2022-24112

Contributor Profile​

This vulnerability was reported to the Apache Software Foundation by Sauercloud. Thank you for your contributions to the Apache community.

Apache Vulnerability for Rewriting X-REAL-IP Header (CVE-2022-24112)

上一篇: Understanding the Significance of 3.4 as a Root in Mathematics
下一篇: Biweekly Report (May 08 - May 22)
相关文章