OSG-SEC-2021-11-03 HIGH severity vulnerability in Apache HTTP mod_proxy
Dear OSG Security Contacts,
A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd (CVE-2021-40438) [1]. The OSG Security Team considers this vulnerability to be of HIGH severity for affected systems.
IMPACTED VERSIONS:
mod_proxy on Apache HTTP Server 2.4.48 and earlier
WHAT ARE THE VULNERABILITIES:
A Server-Side Request Forgery (SSRF) flaw was found in mod_proxy of httpd. This flaw allows a remote, unauthenticated attacker to make the httpd server forward requests to an arbitrary server. The attacker could get, modify, or delete resources on other services that may be behind a firewall and inaccessible otherwise. The impact of this flaw varies based on what services and resources are available on the httpd network. [1][2]
WHAT YOU SHOULD DO:
Sites should update as soon as possible, for updated packages and installation information see below.
For sites running RHEL 8/7 and CentOS see [2]
For sites running Debian see [3]
For sites running Ubuntu see [4]
For sites running Scientific Linux see [5]
REFERENCES
[1] https://nvd.nist.gov/vuln/detail/CVE-2021-40438
[2] https://access.redhat.com/security/cve/CVE-2021-40438
[3] https://security-tracker.debian.org/tracker/CVE-2021-40438
[4] https://ubuntu.com/security/CVE-2021-40438
[5] https://scientificlinux.org/category/sl-errata/
Please contact the OSG security team at [email protected] if you have any questions or concerns.
OSG Security Team