In versions prior to Apache 2.12.1, there is a risk of rewriting X-REAL-IP header after enabling the Apache
batch-requests
plug-in. Now the processing information will be announced.
Problem Description
In versions of Apache prior to 2.12.1 (excluding 2.12.1 and 2.10.4), there is a risk of rewriting the X-REAL-IP header when the Apache batch-requests plugin is enabled.
This risk leads to two problems:
- An attacker bypasses the IP restrictions on the Apache data plane via the batch-requests plugin. For example, bypassing IP black and white list restrictions.
- If the user uses the default Apache configuration (Admin API enabled, with the default Admin Key and no additional admin port assigned), an attacker can invoke the Admin API via the batch-requests plug-in.
Affected Versions
- All versions of Apache between 1.3 ~ 2.12.1 (excluding 2.12.1)
- All LTS versions of Apache between 2.10.0 ~ 2.10.4 (excluding 2.10.4)
Solution
- This issue has been resolved in versions 2.12.1 and 2.10.4, please update to the relevant version as soon as possible.
- In affected versions of Apache , you can avoid this risk by explicitly commenting out batch-requests in the conf/config.yaml and conf/config-default.yaml files and restarting Apache .
Vulnerability details
Severity:High
Vulnerability public date: February 11, 2022
CVE details: https://nvd.nist.gov/vuln/detail/CVE-2022-24112
Contributor Profile
This vulnerability was reported to the Apache Software Foundation by Sauercloud. Thank you for your contributions to the Apache community.