VID |
22729 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
According to its banner, the version of Apache running on the remote host is either 2.4.18 or 2.4.20. Additionally, HTTP/2 is enabled over TLS or SSL. It is, therefore, affected by the an authentication bypass vulnerability in the experimental module for the HTTP/2 protocol due to a failure to correctly validate X.509 certificates, allowing access to resources that otherwise would not be allowed. An unauthenticated, remote attacker can exploit this to disclose potentially sensitive information.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: https://archive.apache.org/dist/httpd/CHANGES_2.4.23 https://httpd.apache.org/security/vulnerabilities_24.html
* Platforms Affected: Apache HTTP versions 2.4.18, 2.4.20 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache HTTP Server (2.4.23 or later), available from the Apache Software Foundation download site, http://httpd.apache.org/download.cgi |
Related URL |
CVE-2016-4979 (CVE) |
Related URL |
91566 (SecurityFocus) |
Related URL |
(ISS) |
|