Thank you. Tenable is reporting this as a critical vulnerability and we'd like to have it resolved in under 30 days.
------------------------------
Lisa Isaly
------------------------------
Original Message:
Sent: Wed January 05, 2022 11:49 AM
From: SANKET RATHI
Subject: httpd - CVE-2021-44224 and CVE-2021-44790 - Update to 2.4.52 or later
Thanks for reporting. We will work on to update httpd for these CVEs.
------------------------------
SANKET RATHI
Original Message:
Sent: Tue December 28, 2021 01:27 PM
From: Lisa Isaly
Subject: httpd - CVE-2021-44224 and CVE-2021-44790 - Update to 2.4.52 or later
- A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included). (CVE-2021-44224)
- A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier. (CVE-2021-44790)
Please upgrade the httpd package to 2.4.52 or later
Thank you!
------------------------------
Lisa Isaly
------------------------------