Asset Report For 172.16.72.212
Asset Report For 172.16.72.212
Asset Report For 172.16.72.212
1. Executive Summary
This report represents a security audit performed by Nexpose from Rapid7 LLC. It contains confidential information about the state of
your network. Access to this information by unauthorized personnel may allow them to compromise your network.
DMZ July 28, 2022 02:00, ICT July 28, 2022 02:14, ICT 14 minutes Success
The audit was performed on one system which was found to be active and was scanned.
There were 57 vulnerabilities found during this scan. Of these, 7 were critical vulnerabilities. Critical vulnerabilities require immediate
attention. They are relatively easy for attackers to exploit and may provide them with full control of the affected systems. 45
vulnerabilities were severe. Severe vulnerabilities are often harder to exploit and may not provide the same access to affected systems.
Page 1
Audit Report
There were 5 moderate vulnerabilities discovered. These often provide information to attackers that may assist them in mounting
subsequent attacks on your network. These should also be fixed in a timely manner, but are not as urgent as the other vulnerabilities.
The cifs-smb-signing-disabled vulnerability poses the highest risk to the organization with a risk score of 1,706. Risk scores are based
on the types and numbers of vulnerabilities on affected assets.
One operating system was identified during this scan.
There were 7 services found to be running during this scan.
The CIFS, CIFS Name Service, DCE Endpoint Resolution, DCE RPC, HTTP and RDP services were found on 1 systems, making them
the most common services. The HTTP service was found to have the most vulnerabilities during this scan with 49 vulnerabilities.
Page 2
Audit Report
2. Discovered Systems
Page 3
Audit Report
3.1.1. Apache HTTPD: mod_http2, DoS attack by exhausting h2 workers. (CVE-2019-9517) (apache-httpd-cve-2019-
9517)
Description:
A malicious client could perform a DoS attack by flooding a connection with requests and basically never reading responses on the
TCP connection. Depending on h2 worker dimensioning, it was possible to block those with relatively few connections.
Affected Nodes:
References:
Source Reference
CERT-VN 605641
CVE CVE-2019-9517
DEBIAN DSA-4509
REDHAT RHSA-2019:2893
REDHAT RHSA-2019:2925
REDHAT RHSA-2019:2939
REDHAT RHSA-2019:2946
REDHAT RHSA-2019:2949
REDHAT RHSA-2019:2950
REDHAT RHSA-2019:2955
REDHAT RHSA-2019:3932
REDHAT RHSA-2019:3933
REDHAT RHSA-2019:3935
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Page 4
Audit Report
3.1.2. Apache HTTPD: mod_session response handling heap overflow (CVE-2021-26691) (apache-httpd-cve-2021-
26691)
Description:
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted SessionHeader sent by an origin server could cause a heap overflow
Affected Nodes:
References:
Source Reference
CVE CVE-2021-26691
DEBIAN DSA-4937
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.48
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.48.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to
these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
Affected Nodes:
Page 5
Audit Report
Source Reference
CVE CVE-2021-39275
DEBIAN DSA-4982
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.49
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.49.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.1.4. Apache HTTPD: Possible buffer overflow when parsing multipart content in mod_lua of Apache HTTP Server 2.4.51
and earlier (CVE-2021-44790) (apache-httpd-cve-2021-44790)
Description:
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts).
The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache
HTTP Server 2.4.51 and earlier.
Affected Nodes:
References:
Source Reference
CVE CVE-2021-44790
DEBIAN DSA-5035
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.52
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.52.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Page 6
Audit Report
3.1.5. Apache HTTPD: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier (CVE-2022-
22720) (apache-httpd-cve-2022-22720)
Description:
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body,
exposing the server to HTTP Request Smuggling
Affected Nodes:
References:
Source Reference
CVE CVE-2022-22720
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.53
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.53.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly
attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-23943
Page 7
Audit Report
Source Reference
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.53
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.53.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.1.7. Apache HTTPD: mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism (CVE-2022-31813) (apache-
httpd-cve-2022-31813)
Description:
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection
header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-31813
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.54
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.54.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.1. Apache HTTPD: <FilesMatch> bypass with a trailing newline in the file name (CVE-2017-15715) (apache-httpd-cve-
2017-15715)
Description:
Page 8
Audit Report
The expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the
end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by
matching the trailing portion of the filename.
Affected Nodes:
References:
Source Reference
BID 103525
CVE CVE-2017-15715
DEBIAN DSA-4164
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.33
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.33.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.2. Apache HTTPD: Weak Digest auth nonce generation in mod_auth_digest (CVE-2018-1312) (apache-httpd-cve-
2018-1312)
Description:
When generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a
pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed
across servers by an attacker without detection.
Affected Nodes:
Page 9
Audit Report
References:
Source Reference
BID 103524
CVE CVE-2018-1312
DEBIAN DSA-4164
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
REDHAT RHSA-2019:1898
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.33
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.33.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.3. Apache HTTPD: mod_auth_digest possible stack overflow by one nul byte (CVE-2020-35452) (apache-httpd-cve-
2020-35452)
Description:
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There
is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler
and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero
byte) of the overflow
Affected Nodes:
References:
Source Reference
CVE CVE-2020-35452
DEBIAN DSA-4937
URL http://httpd.apache.org/security/vulnerabilities_24.html
Page 10
Audit Report
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.48
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.48.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue
affects Apache HTTP Server 2.4.48 and earlier.
Affected Nodes:
References:
Source Reference
CVE CVE-2021-40438
DEBIAN DSA-4982
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.49
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.49.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.5. Apache HTTPD: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody (CVE-2022-
22721) (apache-httpd-cve-2022-22721)
Description:
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow
happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
Affected Nodes:
Page 11
Audit Report
References:
Source Reference
CVE CVE-2022-22721
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.53
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.53.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.6. X.509 Certificate Subject CN Does Not Match the Entity Name (certificate-common-name-mismatch)
Description:
The subject common name (CN) field in the X.509 certificate does not match the name of the entity presenting the certificate.
Before issuing a certificate, a Certification Authority (CA) must check the identity of the entity requesting the certificate, as specified in
the CA's Certification Practice Statement (CPS). Thus, standard certificate validation procedures require the subject CN field of a
certificate to match the actual name of the entity presenting the certificate. For example, in a certificate presented by
"https://www.example.com/", the CN should be "www.example.com".
In order to detect and prevent active eavesdropping attacks, the validity of a certificate must be verified, or else an attacker could then
launch a man-in-the-middle attack and gain full control of the data stream. Of particular importance is the validity of the subject's CN,
that should match the name of the entity (hostname).
A CN mismatch most often occurs due to a configuration error, though it can also indicate that a man-in-the-middle attack is being
conducted.
Please note that this check may flag a false positive against servers that are properly configured using SNI.
Affected Nodes:
172.16.72.212:443 The subject common name found in the X.509 certificate does not seem to
match the scan target:Subject CN *.vnanet.vn does not match target name
specified in the site.Subject CN *.vnanet.vn could not be resolved to an IP
address via DNS lookupSubject Alternative Name *.vnanet.vn does not match
target name specified in the site.Subject Alternative Name vnanet.vn does not
Page 12
Audit Report
Vulnerability Solution:
The subject's common name (CN) field in the X.509 certificate should be fixed to reflect the name of the entity presenting the certificate
(e.g., the hostname). This is done by generating a new certificate usually signed by a Certification Authority (CA) trusted by both the
client and server.
Description:
This system does not allow SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity and helps
prevent man in the middle attacks against SMB. SMB signing can be configured in one of three ways: disabled entirely (least secure),
enabled, and required (most secure).
Affected Nodes:
References:
Source Reference
URL http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-and-
smb2.aspx
Vulnerability Solution:
•Microsoft Windows
Configure SMB signing for Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system specific so
please see this Microsoft article for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
•Samba
Configure SMB signing for Samba
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba
configuration file, typically smb.conf, in the global section:
server signing = auto
To require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
Page 13
Audit Report
Description:
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could
allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
Affected Nodes:
References:
Source Reference
BID 107668
CVE CVE-2019-0217
DEBIAN DSA-4422
REDHAT RHSA-2019:2343
REDHAT RHSA-2019:3436
REDHAT RHSA-2019:3932
REDHAT RHSA-2019:3933
REDHAT RHSA-2019:3935
REDHAT RHSA-2019:4126
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.39
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.39.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Page 14
Audit Report
Description:
Using fuzzed network input, the http/2 session handling could be made to read memory after being freed, during connection shutdown.
Affected Nodes:
References:
Source Reference
CVE CVE-2019-10082
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.41
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.41.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect
instead to an an unexpected URL within the request URL.
Affected Nodes:
References:
Source Reference
CVE CVE-2019-10098
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.41
Page 15
Audit Report
Description:
In Apache HTTP Server versions 2.4.0 to 2.4.41 some mod_rewrite configurations vulnerable to open redirect.
Affected Nodes:
References:
Source Reference
CVE CVE-2020-1927
DEBIAN DSA-4757
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.42
Download and apply the upgrade from: https://httpd.apache.org/download.cgi#apache24
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.12. Apache HTTPD: Possible NULL dereference or SSRF in forward proxy configurations in Apache HTTP Server
2.4.51 and earlier (CVE-2021-44224) (apache-httpd-cve-2021-44224)
Description:
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for
configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket
endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
Affected Nodes:
Page 16
Audit Report
Source Reference
CVE CVE-2021-44224
DEBIAN DSA-5035
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.52
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.52.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when
provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party
modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-28615
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.54
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.54.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Page 17
Audit Report
Description:
This system enables, but does not require SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity
and helps prevent man in the middle attacks against SMB. SMB signing can be configured in one of three ways: disabled entirely (least
secure), enabled, and required (most secure).
Affected Nodes:
References:
Source Reference
URL http://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-and-
smb2.aspx
Vulnerability Solution:
•Microsoft Windows
Configure SMB signing for Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system specific so
please see this Microsoft article for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
•Samba
Configure SMB signing for Samba
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba
configuration file, typically smb.conf, in the global section:
server signing = auto
To require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
Description:
The SMB1 protocol has been deprecated since 2014 and is considered obsolete and insecure.
Page 18
Audit Report
Affected Nodes:
References:
Source Reference
URL https://blogs.technet.microsoft.com/filecab/2016/09/16/stop-using-smb1/
Vulnerability Solution:
•Samba
Remove/disable SMB1
For Samba systems on Linux, disabling SMB1 is quite straightforward:
How to configure Samba to use SMBv2 and disable SMBv1 on Linux or Unix
•Microsoft Windows
Remove/disable SMB1
For Windows 8.1 and Windows Server 2012 R2, removing SMB1 is trivial. On older OS'es it can't be removed but should be disabled.
This article contains system-specific details:
How to detect, enable and disable SMBv1, SMBv2, and SMBv3 in Windows and Windows Server
Description:
This system enables, but does not require SMB signing. SMB signing allows the recipient of SMB packets to confirm their authenticity
and helps prevent man in the middle attacks against SMB. SMB 2.x signing can be configured in one of two ways: not required (least
secure) and required (most secure).
Affected Nodes:
References:
Source Reference
URL https://blogs.technet.com/b/josebda/archive/2010/12/01/the-basics-of-smb-signing-covering-both-smb1-
Page 19
Audit Report
Source Reference
and-smb2.aspx
Vulnerability Solution:
•Microsoft Windows
Configure SMB signing for Windows
Configure the system to enable or require SMB signing as appropriate. The method and effect of doing this is system specific so
please see this Microsoft article for details. Note: ensure that SMB signing configuration is done for incoming connections (Server).
•Samba
Configure SMB signing for Samba
Configure Samba to enable or require SMB signing as appropriate. To enable SMB signing, put the following in the Samba
configuration file, typically smb.conf, in the global section:
server signing = auto
To require SMB signing, put the following in the Samba configuration file, typically smb.conf, in the global section:
server signing = mandatory
Description:
The HTTP TRACE method is normally used to return the full HTTP request back to the requesting client for proxy-debugging purposes.
An attacker can create a webpage using XMLHTTP, ActiveX, or XMLDOM to cause a client to issue a TRACE request and capture the
client's cookies. This effectively results in a Cross-Site Scripting attack.
Affected Nodes:
References:
Source Reference
APPLE APPLE-SA-2009-11-09-1
BID 15222
Page 20
Audit Report
Source Reference
BID 19915
BID 24456
BID 36956
BID 9506
CERT-VN 867593
CVE CVE-2004-2320
CVE CVE-2004-2763
CVE CVE-2005-3398
CVE CVE-2006-4683
CVE CVE-2007-3008
CVE CVE-2008-7253
CVE CVE-2009-2823
CVE CVE-2010-0386
DISA_SEVERITY Category II
DISA_VMSKEY V0011706
IAVM 2005-T-0043
OSVDB 35511
OSVDB 3726
OVAL 1445
URL http://www.apacheweek.com/issues/03-01-24#news
URL http://www.kb.cert.org/vuls/id/867593
XF 14959
XF 34854
Vulnerability Solution:
•Apache HTTPD, Apache Tomcat
Disable HTTP TRACE Method for Apache
Newer versions of Apache (1.3.34 and 2.0.55 and later) provide a configuration directive called TraceEnable. To deny TRACE
requests, add the following line to the server configuration:
TraceEnable off
For older versions of the Apache webserver, use the mod_rewrite module to deny the TRACE requests:
RewriteEngine On
RewriteCond %{REQUEST_METHOD} ^TRACE
RewriteRule .* - [F]
In Apache Tomcat, the HTTP Trace can be disabled by adding security constraints into the Java Servlet specification within the
web.xml configuration file and by setting the attribute allowTrace="False" to the HTTP connector in server.xml. For Spring Boot
Page 21
Audit Report
•IIS, PWS, Microsoft-IIS, Internet Information Services, Internet Information Services, Microsoft-PWS
Disable HTTP TRACE Method for Microsoft IIS
For Microsoft Internet Information Services (IIS), you may use the URLScan tool, freely available at
http://www.microsoft.com/technet/security/tools/urlscan.mspx
•Lotus Domino
Disable HTTP TRACE Method for Domino
Follow IBM's instructions for disabling HTTP methods on the Domino server by adding the following line to the server's NOTES.INI file:
HTTPDisableMethods=TRACE
After saving NOTES.INI, restart the Notes web server by issuing the console command "tell http restart".
3.2.18. Apache HTTPD: Out of bound write in mod_authnz_ldap when using too small Accept-Language values (CVE-
2017-15710) (apache-httpd-cve-2017-15710)
Description:
mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset
encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism
is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less
than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case,
quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is
already reserved for future use and the issue has no effect at all.
Affected Nodes:
Page 22
Audit Report
References:
Source Reference
BID 103512
CVE CVE-2017-15710
DEBIAN DSA-4164
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.33
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.33.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.19. Apache HTTPD: Possible out of bound read in mod_cache_socache (CVE-2018-1303) (apache-httpd-cve-2018-
1303)
Description:
A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.33 due to an out of bound
read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of
mod_cache_socache.
Affected Nodes:
References:
Source Reference
BID 103522
CVE CVE-2018-1303
DEBIAN DSA-4164
Page 23
Audit Report
Source Reference
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.33
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.33.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.20. Apache HTTPD: DoS for HTTP/2 connections by crafted requests (CVE-2018-1333) (apache-httpd-cve-2018-
1333)
Description:
By specially crafting HTTP/2 requests, workers would be allocated 60 seconds longer than necessary, leading to worker exhaustion
and a denial of service. This issue only affects servers that have configured and enabled HTTP/2 support, which is not the default
Affected Nodes:
References:
Source Reference
CVE CVE-2018-1333
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.34
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.34.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Page 24
Audit Report
3.2.21. Apache HTTPD: DoS for HTTP/2 connections via slow request bodies (CVE-2018-17189) (apache-httpd-cve-
2018-17189)
Description:
By sending request bodies in a slow loris way to plain resources, the h2 stream for that request unnecessarily occupied a server thread
cleaning up that incoming data. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
Affected Nodes:
References:
Source Reference
BID 106685
CVE CVE-2018-17189
DEBIAN DSA-4422
REDHAT RHSA-2019:3932
REDHAT RHSA-2019:3933
REDHAT RHSA-2019:3935
REDHAT RHSA-2019:4126
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.38
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.38.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.22. Apache HTTPD: mod_session_cookie does not respect expiry time (CVE-2018-17199) (apache-httpd-cve-2018-
17199)
Description:
In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This
causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is
decoded.
Page 25
Audit Report
Affected Nodes:
References:
Source Reference
BID 106742
CVE CVE-2018-17199
DEBIAN DSA-4422
REDHAT RHSA-2019:3932
REDHAT RHSA-2019:3933
REDHAT RHSA-2019:3935
REDHAT RHSA-2019:4126
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.38
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.38.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
Using fuzzed network input, the http/2 request handling could be made to access freed memory in string comparision when determining
the method of a request and thus process the request incorrectly.
Affected Nodes:
References:
Source Reference
BID 107669
CVE CVE-2019-0196
Page 26
Audit Report
Source Reference
DEBIAN DSA-4422
REDHAT RHSA-2019:3932
REDHAT RHSA-2019:3933
REDHAT RHSA-2019:3935
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.39
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.39.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.24. Apache HTTPD: Apache httpd URL normalization inconsistincy (CVE-2019-0220) (apache-httpd-cve-2019-0220)
Description:
When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and
RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse
them.
Affected Nodes:
References:
Source Reference
BID 107670
CVE CVE-2019-0220
DEBIAN DSA-4422
REDHAT RHSA-2019:2343
REDHAT RHSA-2019:3436
REDHAT RHSA-2019:4126
REDHAT RHSA-2020:0250
REDHAT RHSA-2020:0251
URL http://httpd.apache.org/security/vulnerabilities_24.html
Page 27
Audit Report
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.39
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.39.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.25. Apache HTTPD: mod_http2, memory corruption on early pushes (CVE-2019-10081) (apache-httpd-cve-2019-
10081)
Description:
HTTP/2 very early pushes, for example configured with "H2PushResource", could lead to an overwrite of memory in the pushing
request's pool, leading to crashes. The memory copied is that of the configured push link header values, not data supplied by the client.
Affected Nodes:
References:
Source Reference
CVE CVE-2019-10081
DEBIAN DSA-4509
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.41
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.41.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.26. Apache HTTPD: mod_proxy_wstunnel tunneling of non Upgraded connections (CVE-2019-17567) (apache-httpd-
cve-2019-17567)
Description:
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the
origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass
through with no HTTP validation, authentication or authorization possibly configured.
Page 28
Audit Report
Affected Nodes:
References:
Source Reference
CVE CVE-2019-17567
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.48
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.48.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
in Apache HTTP Server versions 2.4.0 to 2.4.41, mod_proxy_ftp use of uninitialized value with malicious FTP backend.
Affected Nodes:
References:
Source Reference
CVE CVE-2020-1934
DEBIAN DSA-4757
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.42
Download and apply the upgrade from: https://httpd.apache.org/download.cgi#apache24
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Page 29
Audit Report
3.2.28. Apache HTTPD: Push Diary Crash on Specifically Crafted HTTP/2 Header (CVE-2020-9490) (apache-httpd-cve-
2020-9490)
Description:
Apache HTTP Server versions 2.4.20 to 2.4.43 A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result
in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will
mitigate this vulnerability for unpatched servers.
Affected Nodes:
References:
Source Reference
CVE CVE-2020-9490
DEBIAN DSA-4757
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.44
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.44.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer
dereference and crash, leading to a possible Denial Of Service
Affected Nodes:
References:
Page 30
Audit Report
Source Reference
CVE CVE-2021-26690
DEBIAN DSA-4937
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.48
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.48.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.30. Apache HTTPD: Request splitting via HTTP/2 method injection and mod_proxy (CVE-2021-33193) (apache-httpd-
cve-2021-33193)
Description:
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or
cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
Affected Nodes:
References:
Source Reference
CVE CVE-2021-33193
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.49
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.49.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.31. Apache HTTPD: NULL pointer dereference in httpd core (CVE-2021-34798) (apache-httpd-cve-2021-34798)
Description:
Page 31
Audit Report
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
Affected Nodes:
References:
Source Reference
CVE CVE-2021-34798
DEBIAN DSA-4982
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.49
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.49.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.32. Apache HTTPD: mod_lua Use of uninitialized value of in r:parsebody (CVE-2022-22719) (apache-httpd-cve-2022-
22719)
Description:
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects
Apache HTTP Server 2.4.52 and earlier.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-22719
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Page 32
Audit Report
Description:
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server
allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP
Server 2.4 version 2.4.53 and prior versions.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-26377
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.54
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.54.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the
mod_isapi module.
Affected Nodes:
Page 33
Audit Report
Source Reference
CVE CVE-2022-28330
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.54
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.54.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.35. Apache HTTPD: read beyond bounds via ap_rwrite() (CVE-2022-28614) (apache-httpd-cve-2022-28614)
Description:
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to
reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed
separately from Apache HTTP Server that use the "ap_rputs" function and may pass it a very large (INT_MAX or larger) string must be
compiled against current headers to resolve the issue.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-28614
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.54
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.54.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Page 34
Audit Report
Description:
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service
due to no default limit on possible input size.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-29404
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.54
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.54.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.37. Apache HTTPD: Information Disclosure in mod_lua with websockets (CVE-2022-30556) (apache-httpd-cve-2022-
30556)
Description:
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage
allocated for the buffer.
Affected Nodes:
References:
Source Reference
CVE CVE-2022-30556
URL http://httpd.apache.org/security/vulnerabilities_24.html
Page 35
Audit Report
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.54
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.54.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
The web server publicly offers a report on its configuration to anyone who requests it, revealing sensitive details that give a potential
attacker important information about how to attack the web server.
Affected Nodes:
References:
None
Vulnerability Solution:
The configuration file for apache (httpd.conf), reads:
<Location /server-info>
SetHandler server-info
</Location>
To remove the feature from Apache, rewrite this to:
# comment everything out
#<Location /server-info>
# SetHandler server-info
#</Location>
To keep the feature, adding access control, rewrite it to:
# add access control
<Location/server-info>
SetHandler server-info
Order deny,allow
Deny from all
Page 36
Audit Report
3.2.39. Apache HTTPD: DoS for HTTP/2 connections by continuous SETTINGS (CVE-2018-11763) (apache-httpd-cve-
2018-11763)
Description:
By sending continous SETTINGS frames of maximum size an ongoing HTTP/2 connection could be kept busy and would never time
out. This can be abused for a DoS on the server. This only affect a server that has enabled the h2 protocol.
Affected Nodes:
References:
Source Reference
BID 105414
CVE CVE-2018-11763
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.35
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.35.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.40. Apache HTTPD: Tampering of mod_session data for CGI applications (CVE-2018-1283) (apache-httpd-cve-2018-
1283)
Description:
When mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may
influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to
forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI
specifications. The severity is set to Moderate because "SessionEnv on" is not a default nor common configuration, it should be
Page 37
Audit Report
considered more severe when this is the case though, because of the possible remote exploitation.
Affected Nodes:
References:
Source Reference
BID 103520
CVE CVE-2018-1283
DEBIAN DSA-4164
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.33
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.33.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.41. Apache HTTPD: Possible out of bound access after failure in reading the HTTP request (CVE-2018-1301)
(apache-httpd-cve-2018-1301)
Description:
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.33, due to an out of bound access after a
size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug
mode (both log and build level), so it is classified as low risk for common server usage.
Affected Nodes:
References:
Page 38
Audit Report
Source Reference
BID 103515
CVE CVE-2018-1301
DEBIAN DSA-4164
REDHAT RHSA-2018:3558
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.33
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.33.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.42. Apache HTTPD: Possible write of after free on HTTP/2 stream shutdown (CVE-2018-1302) (apache-httpd-cve-
2018-1302)
Description:
When an HTTP/2 stream was destroyed after being handled, the Apache HTTP Server prior to version 2.4.33 could have written a
NULL pointer potentially to an already freed memory. The memory pools maintained by the server make this vulnerabilty hard to trigger
in usual configurations, the reporter and the team could not reproduce it outside debug builds, so it is classified as low risk.
Affected Nodes:
References:
Source Reference
BID 103528
CVE CVE-2018-1302
REDHAT RHSA-2019:0366
REDHAT RHSA-2019:0367
URL http://httpd.apache.org/security/vulnerabilities_24.html
Page 39
Audit Report
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.33
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.33.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.43. Apache HTTPD: Limited cross-site scripting in mod_proxy error page (CVE-2019-10092) (apache-httpd-cve-2019-
10092)
Description:
A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page
to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying
enabled but was misconfigured in such a way that the Proxy Error page was displayed. We have taken this opportunity to also remove
request data from many other in-built error messages. Note however this issue did not affect them directly and their output was already
escaped to prevent cross-site scripting attacks.
Affected Nodes:
References:
Source Reference
CVE CVE-2019-10092
DEBIAN DSA-4509
REDHAT RHSA-2019:4126
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.41
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.41.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
3.2.44. Apache HTTPD: Push Diary Crash on Specifically Crafted HTTP/2 Header (CVE-2020-11993) (apache-httpd-cve-
2020-11993)
Description:
Page 40
Audit Report
Apache HTTP Server versions 2.4.20 to 2.4.43 When trace/debug was enabled for the HTTP/2 module and on certain traffic edge
patterns, logging statements were made on the wrong connection, causing concurrent use of memory pools. Configuring the LogLevel
of mod_http2 above "info" will mitigate this vulnerability for unpatched servers.
Affected Nodes:
References:
Source Reference
CVE CVE-2020-11993
DEBIAN DSA-4757
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.44
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.44.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
The web server publicly offers a report on its current state to anyone who requests it, revealing details that could give a potential
attacker information about how to attack the web server.
Affected Nodes:
Page 41
Audit Report
References:
None
Vulnerability Solution:
The configuration file for apache (httpd.conf), reads:
<Location /server-status>
SetHandler server-status
</Location>
To remove the feature from Apache, rewrite this to:
# comment everything out
#<Location /server-status>
# SetHandler server-status
#</Location>
To keep the feature, adding access control, rewrite this to:
# add access control
<Location/server-status>
SetHandler server-status
Order deny,allow
Deny from all
Allow from 127.0.0.1
</Location>
Once these changes have been made, the Apache server needs to be restarted.
Description:
Web servers that respond to the OPTIONS HTTP method expose what other methods are supported by the web server, allowing
attackers to narrow and intensify their efforts.
Affected Nodes:
References:
Source Reference
URL https://www.owasp.org/index.php/Test_HTTP_Methods_(OTG-CONFIG-006)
Page 42
Audit Report
Vulnerability Solution:
•Disable HTTP OPTIONS method
Disable HTTP OPTIONS method on your web server. Refer to your web server's instruction manual on how to do this.
Web servers that respond to the OPTIONS HTTP method expose what other methods are supported by the web server, allowing
attackers to narrow and intensify their efforts.
•Apache HTTPD
Disable HTTP OPTIONS Method for Apache
Disable the OPTIONS method by including the following in the Apache configuration:
<Limit OPTIONS>
Order deny,allow
Deny from all
</Limit>
•Microsoft IIS
Disable HTTP OPTIONS Method for IIS
Disable the OPTIONS method by doing the following in the IIS manager
1. Select relevent site
2. Select Request filtering and change to HTTP verb tab
3. Select Deny Verb from the actions pane
4. Type OPTIONS into the provided text box and press OK
•nginx nginx
Disable HTTP OPTIONS Method for nginx
Disable the OPTIONS method by adding the following line to your server block, you can add other HTTP methods to be allowed to run
after POST
limit_except GET POST { deny all; }
Description:
Affected Nodes:
172.16.72.212:80 Vulnerable OS: Microsoft Windows Server 2008 R2, Standard Edition SP1
Page 43
Audit Report
Source Reference
CVE CVE-2020-13938
URL http://httpd.apache.org/security/vulnerabilities_24.html
Vulnerability Solution:
Apache HTTPD >= 2.4 and < 2.4.48
Download and apply the upgrade from: http://archive.apache.org/dist/httpd/httpd-2.4.48.tar.gz
Many platforms and distributions provide pre-built binary packages for Apache HTTP server. These pre-built packages are usually
customized and optimized for a particular distribution, therefore we recommend that you use the packages if they are available for your
operating system.
Description:
The remote host responded to an ICMP timestamp request. The ICMP timestamp response contains the remote host's date and time.
This information could theoretically be used against some systems to exploit weak time-based random number generators in other
services.
In addition, the versions of some operating systems can be accurately fingerprinted by analyzing their responses to invalid ICMP
timestamp requests.
Affected Nodes:
References:
Source Reference
CVE CVE-1999-0524
OSVDB 95
XF 306
XF 322
Vulnerability Solution:
•HP-UX
Disable ICMP timestamp responses on HP/UX
Page 44
Audit Report
•Cisco IOS
Disable ICMP timestamp responses on Cisco IOS
Use ACLs to block ICMP types 13 and 14. For example:
deny icmp any any 13
deny icmp any any 14
Note that it is generally preferable to use ACLs that block everything by default and then selectively allow certain types of traffic in. For
example, block everything and then only allow ICMP unreachable, ICMP echo reply, ICMP time exceeded, and ICMP source quench:
permit icmp any any unreachable
permit icmp any any echo-reply
permit icmp any any time-exceeded
permit icmp any any source-quench
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•SGI Irix
Disable ICMP timestamp responses on SGI Irix
IRIX does not offer a way to disable ICMP timestamp responses. Therefore, you should block ICMP on the affected host using ipfilterd,
and/or block it at any external firewalls.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Linux
Disable ICMP timestamp responses on Linux
Linux offers neither a sysctl nor a /proc/sys/net/ipv4 interface to disable ICMP timestamp responses. Therefore, you should block ICMP
on the affected host using iptables, and/or block it at the firewall. For example:
ipchains -A input -p icmp --icmp-type timestamp-request -j DROP
ipchains -A output -p icmp --icmp-type timestamp-reply -j DROP
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Microsoft Windows NT, Microsoft Windows NT Workstation, Microsoft Windows NT Server, Microsoft Windows NT Advanced Server,
Microsoft Windows NT Server, Enterprise Edition, Microsoft Windows NT Server, Terminal Server Edition
Disable ICMP timestamp responses on Windows NT 4
Windows NT 4 does not provide a way to block ICMP packets. Therefore, you should block them at the firewall.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
Page 45
Audit Report
•OpenBSD
Disable ICMP timestamp responses on OpenBSD
Set the "net.inet.icmp.tstamprepl" sysctl variable to 0.
sysctl -w net.inet.icmp.tstamprepl=0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Cisco PIX
Disable ICMP timestamp responses on Cisco PIX
A properly configured PIX firewall should never respond to ICMP packets on its external interface. In PIX Software versions 4.1(6) until
5.2.1, ICMP traffic to the PIX's internal interface is permitted; the PIX cannot be configured to NOT respond. Beginning in PIX Software
version 5.2.1, ICMP is still permitted on the internal interface by default, but ICMP responses from its internal interfaces can be
disabled with the icmp command, as follows, where <inside> is the name of the internal interface:
icmp deny any 13 <inside>
icmp deny any 14 <inside>
Don't forget to save the configuration when you are finished.
See Cisco's support document Handling ICMP Pings with the PIX Firewall for more information.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Sun Solaris
Disable ICMP timestamp responses on Solaris
Execute the following commands:
/usr/sbin/ndd -set /dev/ip ip_respond_to_timestamp 0
/usr/sbin/ndd -set /dev/ip ip_respond_to_timestamp_broadcast 0
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Microsoft Windows 2000, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced
Server, Microsoft Windows 2000 Datacenter Server
Disable ICMP timestamp responses on Windows 2000
Use the IPSec filter feature to define and apply an IP filter list that blocks ICMP types 13 and 14. Note that the standard TCP/IP
blocking capability under the "Networking and Dialup Connections" control panel is NOT capable of blocking ICMP (only TCP and
UDP). The IPSec filter features, while they may seem strictly related to the IPSec standards, will allow you to selectively block these
ICMP packets. See http://support.microsoft.com/kb/313190 for more information.
The easiest and most effective solution is to configure your firewall to block incoming and outgoing ICMP packets with ICMP types 13
(timestamp request) and 14 (timestamp response).
•Microsoft Windows XP, Microsoft Windows XP Home, Microsoft Windows XP Professional, Microsoft Windows Server 2003, Microsoft
Windows Server 2003, Standard Edition, Microsoft Windows Server 2003, Enterprise Edition, Microsoft Windows Server 2003,
Datacenter Edition, Microsoft Windows Server 2003, Web Edition, Microsoft Windows Small Business Server 2003
Page 46
Audit Report
•Microsoft Windows Vista, Microsoft Windows Vista Home, Basic Edition, Microsoft Windows Vista Home, Basic N Edition, Microsoft
Windows Vista Home, Premium Edition, Microsoft Windows Vista Ultimate Edition, Microsoft Windows Vista Enterprise Edition,
Microsoft Windows Vista Business Edition, Microsoft Windows Vista Business N Edition, Microsoft Windows Vista Starter Edition,
Microsoft Windows Server 2008, Microsoft Windows Server 2008 Standard Edition, Microsoft Windows Server 2008 Enterprise Edition,
Microsoft Windows Server 2008 Datacenter Edition, Microsoft Windows Server 2008 HPC Edition, Microsoft Windows Server 2008
Web Edition, Microsoft Windows Server 2008 Storage Edition, Microsoft Windows Small Business Server 2008, Microsoft Windows
Essential Business Server 2008
Disable ICMP timestamp responses on Windows Vista/2008
ICMP timestamp responses can be disabled via the netsh command line utility.
1. Go to the Windows Control Panel.
2. Select "Windows Firewall".
3. In the Windows Firewall box, select "Change Settings".
4. Enable the firewall by selecting the "on (recommended)" option.
5. Open a Command Prompt.
6. Enter "netsh firewall set icmpsetting 13 disable"
For more information, see: http://www.microsoft.com/resources/documentation/windows/xp/all/proddocs/en-
us/hnw_understanding_firewall.mspx?mfr=true
Page 47
Audit Report
Description:
The remote host responded with a TCP timestamp. The TCP timestamp response can be used to approximate the remote host's
uptime, potentially aiding in further attacks. Additionally, some operating systems can be fingerprinted based on the behavior of their
TCP timestamps.
Affected Nodes:
References:
Source Reference
URL http://uptime.netcraft.com
URL http://www.forensicswiki.org/wiki/TCP_timestamps
URL http://www.ietf.org/rfc/rfc1323.txt
Vulnerability Solution:
•Cisco
Disable TCP timestamp responses on Cisco
Run the following command to disable TCP timestamps:
no ip tcp timestamp
•FreeBSD
Disable TCP timestamp responses on FreeBSD
Set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.inet.tcp.rfc1323=0
•Linux
Disable TCP timestamp responses on Linux
Set the value of net.ipv4.tcp_timestamps to 0 by running the following command:
Page 48
Audit Report
sysctl -w net.ipv4.tcp_timestamps=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.ipv4.tcp_timestamps=0
•OpenBSD
Disable TCP timestamp responses on OpenBSD
Set the value of net.inet.tcp.rfc1323 to 0 by running the following command:
sysctl -w net.inet.tcp.rfc1323=0
Additionally, put the following value in the default sysctl configuration file, generally sysctl.conf:
net.inet.tcp.rfc1323=0
•Microsoft Windows NT, Microsoft Windows NT Workstation, Microsoft Windows NT Server, Microsoft Windows NT Advanced Server,
Microsoft Windows NT Server, Enterprise Edition, Microsoft Windows NT Server, Terminal Server Edition, Microsoft Windows 95,
Microsoft Windows 98, Microsoft Windows 98SE, Microsoft Windows ME, Microsoft Windows 2000, Microsoft Windows 2000
Professional, Microsoft Windows 2000 Server, Microsoft Windows 2000 Advanced Server, Microsoft Windows 2000 Datacenter
Server, Microsoft Windows XP, Microsoft Windows XP Home, Microsoft Windows XP Professional, Microsoft Windows XP Tablet PC
Edition, Microsoft Windows CE, Microsoft Windows Server 2003, Microsoft Windows Server 2003, Standard Edition, Microsoft
Windows Server 2003, Enterprise Edition, Microsoft Windows Server 2003, Datacenter Edition, Microsoft Windows Server 2003, Web
Edition, Microsoft Windows Small Business Server 2003, Microsoft Windows Server 2003 R2, Microsoft Windows Server 2003 R2,
Standard Edition, Microsoft Windows Server 2003 R2, Enterprise Edition, Microsoft Windows Server 2003 R2, Datacenter Edition,
Microsoft Windows Server 2003 R2, Web Edition, Microsoft Windows Small Business Server 2003 R2, Microsoft Windows Server 2003
R2, Express Edition, Microsoft Windows Server 2003 R2, Workgroup Edition
Disable TCP timestamp responses on Windows versions before Vista
Set the Tcp1323Opts value in the following key to 1:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Tcpip\Parameters
•Microsoft Windows Server 2008, Microsoft Windows Server 2008 Standard Edition, Microsoft Windows Server 2008 Enterprise Edition,
Microsoft Windows Server 2008 Datacenter Edition, Microsoft Windows Server 2008 HPC Edition, Microsoft Windows Server 2008
Web Edition, Microsoft Windows Server 2008 Storage Edition, Microsoft Windows Small Business Server 2008, Microsoft Windows
Essential Business Server 2008, Microsoft Windows Server 2008 R2, Microsoft Windows Server 2008 R2, Standard Edition, Microsoft
Windows Server 2008 R2, Enterprise Edition, Microsoft Windows Server 2008 R2, Datacenter Edition, Microsoft Windows Server 2008
Page 49
Audit Report
R2, Web Edition, Microsoft Windows Server 2012, Microsoft Windows Server 2012 Standard Edition, Microsoft Windows Server 2012
Foundation Edition, Microsoft Windows Server 2012 Essentials Edition, Microsoft Windows Server 2012 Datacenter Edition, Microsoft
Windows Storage Server 2012, Microsoft Windows Vista, Microsoft Windows Vista Home, Basic Edition, Microsoft Windows Vista
Home, Basic N Edition, Microsoft Windows Vista Home, Premium Edition, Microsoft Windows Vista Ultimate Edition, Microsoft
Windows Vista Enterprise Edition, Microsoft Windows Vista Business Edition, Microsoft Windows Vista Business N Edition, Microsoft
Windows Vista Starter Edition, Microsoft Windows 7, Microsoft Windows 7 Home, Basic Edition, Microsoft Windows 7 Home, Basic N
Edition, Microsoft Windows 7 Home, Premium Edition, Microsoft Windows 7 Home, Premium N Edition, Microsoft Windows 7 Ultimate
Edition, Microsoft Windows 7 Ultimate N Edition, Microsoft Windows 7 Enterprise Edition, Microsoft Windows 7 Enterprise N Edition,
Microsoft Windows 7 Professional Edition, Microsoft Windows 7 Starter Edition, Microsoft Windows 7 Starter N Edition, Microsoft
Windows 8, Microsoft Windows 8 Enterprise Edition, Microsoft Windows 8 Professional Edition, Microsoft Windows 8 RT, Microsoft
Windows Longhorn Server Beta
Disable TCP timestamp responses on Windows versions since Vista
TCP timestamps cannot be reliably disabled on this OS. If TCP timestamps present enough of a risk, put a firewall capable of blocking
TCP timestamp packets in front of the affected assets.
Description:
A NetBIOS NBSTAT query will obtain the status from a NetBIOS-speaking endpoint, which will include any names that the endpoint is
known to respond to as well as the device's MAC address for that endpoint. A NBSTAT response is roughly 3x the size of the request,
and because NetBIOS utilizes UDP, this can be used to conduct traffic amplification attacks against other assets, typically in the form of
distributed reflected denial of service (DRDoS) attacks.
Affected Nodes:
References:
Source Reference
CERT TA14-017A
Vulnerability Solution:
NetBIOS can be important to the proper functioning of a Windows network depending on the design. Restrict access to the NetBIOS
service to only trusted assets.
Page 50
Audit Report
4. Discovered Services
4.1. <unknown>
Page 51
Audit Report
a3dc998215dbf8b26fb864aa74e78635
b5350c237f84cc7e2db408d818fc0aab
efb8ce447f7d8dcfc7c252406835c715
9d4fa642d1b13d34843fd75f048b88a8
ec8192b8a847c7aa08f00f15271c7f49
b79f3b4337cd7bfa63d9df2c725248d5
29bdca08ba97a4648f2154c980746ab
•ssl.protocols: tlsv1_0,tlsv1_1,tlsv1_2
•sslv3: false
•tlsv1_0: true
•tlsv1_0.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA.dh.keysize: 1024
•tlsv1_0.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA.dh.keysize: 1024
•tlsv1_0.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_DHE_RSA_WITH_AE
S_256_CBC_SHA,TLS_RSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_R
SA_WITH_AES_128_CBC_SHA,TLS_
DHE_RSA_WITH_AES_128_CBC_S
HA,TLS_RSA_WITH_AES_128_CBC
_SHA
•tlsv1_0.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_1: true
•tlsv1_1.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA.dh.keysize: 1024
•tlsv1_1.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA.dh.keysize: 1024
•tlsv1_1.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_DHE_RSA_WITH_AE
S_256_CBC_SHA,TLS_RSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_R
SA_WITH_AES_128_CBC_SHA,TLS_
DHE_RSA_WITH_AES_128_CBC_S
HA,TLS_RSA_WITH_AES_128_CBC
_SHA
Page 52
Audit Report
•tlsv1_1.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_2: true
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
128_CBC_SHA.dh.keysize: 1024
•tlsv1_2.TLS_DHE_RSA_WITH_AES_
256_CBC_SHA.dh.keysize: 1024
•tlsv1_2.ciphers:
TLS_ECDHE_RSA_WITH_AES_256_
CBC_SHA,TLS_DHE_RSA_WITH_AE
S_256_CBC_SHA,TLS_RSA_WITH_
AES_256_CBC_SHA,TLS_ECDHE_R
SA_WITH_AES_128_CBC_SHA,TLS_
DHE_RSA_WITH_AES_128_CBC_S
HA,TLS_RSA_WITH_AES_128_CBC
_SHA
•tlsv1_2.extensions:
RENEGOTIATION_INFO,EC_POINT_
FORMATS
•tlsv1_3: false
4.2. CIFS
CIFS, the Common Internet File System, was defined by Microsoft to provide file sharing services over the Internet. CIFS extends the
Server Message Block (SMB) protocol designed by IBM and enhanced by Intel and Microsoft. CIFS provides mechanisms for sharing
resources (files, printers, etc.) and executing remote procedure calls over named pipes.
Page 53
Audit Report
•password-mode: encrypt
•security-mode: user
•smb-signing: disabled
•smb1-enabled: true
•smb2-enabled: true
•smb2-signing: enabled
Page 54
Audit Report
•interface-version: 1
•name: D95AFE70-A6D5-4259-822E-
2C84DA1DDB0D
•object-interface-uuid: 765294BA-
60BC-48B8-92E9-89FD77769D91
•port.discovered.from: tcp/135
•protocol-sequence:
ncacn_ip_tcp:172.16.72.212[49152]
4.6. HTTP
HTTP, the HyperText Transfer Protocol, is used to exchange multimedia content on the World Wide Web. The multimedia files
commonly used with HTTP include text, sound, images and video.
4.7. RDP
Page 55
Audit Report
•ssl.protocols: tlsv1_0
•sslv3: false
•tlsv1_0: true
•tlsv1_0.ciphers:
TLS_RSA_WITH_AES_128_CBC_SH
A,TLS_RSA_WITH_AES_256_CBC_S
HA,TLS_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_3DES_EDE_CBC_
SHA,TLS_ECDHE_RSA_WITH_AES_
128_CBC_SHA,TLS_ECDHE_RSA_
WITH_AES_256_CBC_SHA,TLS_RS
A_WITH_RC4_128_MD5
•tlsv1_0.extensions:
RENEGOTIATION_INFO
•tlsv1_1: false
•tlsv1_2: false
•tlsv1_3: false
Page 56
Audit Report
Page 57
Audit Report
6. Discovered Databases
No database information was discovered during the scan.
Page 58
Audit Report
Page 59
Audit Report
8. Policy Evaluations
No policy evaluations were performed.
Page 60
Audit Report
9.1. http://172.16.72.212:80
Page 61