Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 

Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Vigil@nce - Apache httpd: data reading via mod_proxy

August 2010 by Vigil@nce

This bulletin was written by Vigil@nce : http://vigilance.fr/

SYNTHESIS OF THE VULNERABILITY

When mod_proxy is installed Unix, an attacker can obtain documents
belonging to the session of another user.

Severity: 1/4

Creation date: 30/07/2010

DESCRIPTION OF THE VULNERABILITY

The Apache httpd mod_proxy module is installed between clients and
backend web servers. The mod_proxy module use HTTP Keep-Alive
connections to backend servers, which are kept open in order to
deliver several documents.

However, on Unix, the timeout state of HTTP Keep-Alive connections
is not processed, and data belonging to another connection can be
returned to the user.

When mod_proxy is installed Unix, an attacker can therefore obtain
documents belonging to the session of another user. In order to
cause this error, the attacker for example has to slow down the
server, in order to generate a timeout.

ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN

http://vigilance.fr/vulnerability/Apache-httpd-data-reading-via-mod-proxy-9801


See previous articles

    

See next articles


Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts