Vulnerability Name: | CVE-2019-0215 (CCN-158951) |
Assigned: | 2018-11-14 |
Published: | 2019-04-01 |
Updated: | 2021-06-06 |
Summary: | In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions. |
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): High | 7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None | 6.8 Medium (REDHAT CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N) 5.9 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): High Privileges Required (PR): Low User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): High Availibility (A): None |
|
CVSS v2 Severity: | 6.0 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:P/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Medium Authentication (Au): Single_Instance | Impact Metrics: | Confidentiality (C): Partial Integrity (I): Partial Availibility (A): Partial | 7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:C/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Complete Availibility (A): None |
|
Vulnerability Type: | CWE-noinfo CWE-284
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2019-0215
Source: MLIST Type: Mailing List, Mitigation, Third Party Advisory [oss-security] 20190401 CVE-2019-0215: mod_ssl access control bypass
Source: BID Type: Third Party Advisory, VDB Entry 107667
Source: REDHAT Type: UNKNOWN RHSA-2019:0980
Source: XF Type: UNKNOWN apache-httpserver-cve20190215-sec-bypass(158951)
Source: CCN Type: Apache Web site important: mod_ssl access control bypass (CVE-2019-0215)
Source: MISC Type: Vendor Advisory https://httpd.apache.org/security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-dev] 20190804 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t
Source: MLIST Type: Mailing List, Exploit, Vendor Advisory [httpd-cvs] 20190402 svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t
Source: MLIST Type: UNKNOWN [httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-dev] 20190806 Re: svn commit: r1856807 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t
Source: MLIST Type: UNKNOWN [httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20190806 svn commit: r1864463 - /httpd/test/framework/trunk/t/security/CVE-2019-0215.t
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073139 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073143 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210606 svn commit: r1075470 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1888194 [12/13] - /httpd/site/trunk/content/security/json/
Source: MLIST Type: UNKNOWN [httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073149 [12/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
Source: MLIST Type: UNKNOWN [httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
Source: FEDORA Type: UNKNOWN FEDORA-2019-a4ed7400f4
Source: FEDORA Type: Third Party Advisory FEDORA-2019-119b14075a
Source: FEDORA Type: Third Party Advisory FEDORA-2019-cf7695b470
Source: CCN Type: oss-sec Mailing List, Mon, 01 Apr 2019 20:31:27 -0500 CVE-2019-0215: mod_ssl access control bypass
Source: CONFIRM Type: Third Party Advisory https://security.netapp.com/advisory/ntap-20190423-0001/
Source: CONFIRM Type: Third Party Advisory https://support.f5.com/csp/article/K59440504
Source: CCN Type: IBM Security Bulletin 881246 (Rational Build Forge) Rational Build Forge Security Advisory for Apache HTTP Server (CVE-2019-0196;CVE-2019-0197;CVE-2019-0211;CVE-2019-0215;CVE-2019-0217; and CVE-2019-0220)
Source: CCN Type: IBM Security Bulletin 1489173 (Aspera Faspex) Aspera Web Applications (Faspex, Console) are affected by Apache Vulnerabilities (CVE-2019-0196, CVE-2019-0197, CVE-2019-0215, CVE-2019-0217, CVE-2019-0220)
Source: N/A Type: UNKNOWN N/A
Source: MISC Type: UNKNOWN https://www.oracle.com/security-alerts/cpujan2020.html
Source: MISC Type: UNKNOWN https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: MISC Type: UNKNOWN https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:apache:http_server:2.4.37:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.4.38:*:*:*:*:*:*:* Configuration 2: cpe:/o:fedoraproject:fedora:30:*:*:*:*:*:*:*OR cpe:/o:fedoraproject:fedora:29:*:*:*:*:*:*:* Configuration RedHat 1: cpe:/a:redhat:enterprise_linux:8:*:*:*:*:*:*:* Configuration RedHat 2: cpe:/a:redhat:enterprise_linux:8::appstream:*:*:*:*:* Configuration CCN 1: cpe:/a:apache:http_server:2.4.37:*:*:*:*:*:*:*OR cpe:/a:apache:http_server:2.4.38:*:*:*:*:*:*:*AND cpe:/a:ibm:rational_build_forge:8.0.0.6:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:8.0.0.7:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:8.0.0.8:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:8.0.0.9:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:8.0.0.10:*:*:*:*:*:*:*OR cpe:/a:ibm:rational_build_forge:8.0.0.11:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |
apache http server 2.4.37
apache http server 2.4.38
fedoraproject fedora 30
fedoraproject fedora 29
apache http server 2.4.37
apache http server 2.4.38
ibm rational build forge 8.0.0.6
ibm rational build forge 8.0.0.7
ibm rational build forge 8.0.0.8
ibm rational build forge 8.0.0.9
ibm rational build forge 8.0.0.10
ibm rational build forge 8.0.0.11