CVE-2019-17567
Publication date 10 June 2021
Last updated 26 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| apache2 | 25.10 questing |
Not affected
|
| 25.04 plucky |
Not affected
|
|
| 24.04 LTS noble |
Not affected
|
|
| 22.04 LTS jammy |
Not affected
|
|
| 20.04 LTS focal |
Vulnerable, fix deferred
|
|
| 18.04 LTS bionic |
Vulnerable, fix deferred
|
|
| 16.04 LTS xenial |
Vulnerable, fix deferred
|
|
| 14.04 LTS trusty |
Vulnerable, fix deferred
|
Notes
mdeslaur
The patches required to fix this in stable releases are quite intrusive and change behaviour. It may not make sense to backport them to stable releases.
Patch details
| Package | Patch details |
|---|---|
| apache2 |
|
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | None |
| Integrity impact | Low |
| Availability impact | None |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
References
Other references
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2019-17567
- https://lists.apache.org/thread.html/r90f693a5c9fb75550ef1412436d5e682a5f845beb427fa6f23419a3c@%3Cannounce.httpd.apache.org%3E
- http://www.openwall.com/lists/oss-security/2021/06/10/2
- https://www.cve.org/CVERecord?id=CVE-2019-17567