Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Apache HTTP Server < 2.4.39 mod_ssl Access Control Bypass Vulnerability (Linux)
Information
Severity
Severity
Medium
Family
Family
Web Servers
CVSSv2 Base
CVSSv2 Base
6.0
CVSSv2 Vector
CVSSv2 Vector
AV:N/AC:M/Au:S/C:P/I:P/A:P
Solution Type
Solution Type
Vendor Patch
Created
Created
4 years ago
Modified
Modified
4 years ago
Summary
In Apache HTTP Server a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client supporting Post-Handshake Authentication to bypass configured access control restrictions.
Affected Software
Affected Software
Apache HTTP server version 2.4.37 and 2.4.38.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Update to version 2.4.39 or later.