A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
25 Jul 2022, 18:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
06 Jun 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
03 Jun 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-06-11 21:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-0220
Mitre link : CVE-2019-0220
CVE.ORG link : CVE-2019-0220
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
opensuse
- leap
apache
- http_server
fedoraproject
- fedora
CWE
CWE-706
Use of Incorrectly-Resolved Name or Reference