CVE-2021-44790
Apache HTTP Server vulnerability analysis and mitigation

Overview

A carefully crafted request body can cause a buffer overflow in the modlua multipart parser (r:parsebody() called from Lua scripts) in Apache HTTP Server 2.4.51 and earlier. The vulnerability was discovered on December 7, 2021 and publicly disclosed on December 20, 2021. The Apache httpd team was not aware of an exploit for the vulnerability at the time of disclosure, though they noted it might be possible to craft one ([Apache Security](http://httpd.apache.org/security/vulnerabilities24.html), OSS Security).

Technical details

The vulnerability exists in the mod_lua module's multipart parser functionality, specifically in the r:parsebody() function that can be called from Lua scripts. When processing a specially crafted request body, a buffer overflow condition can occur. The vulnerability has been assigned CVE-2021-44790 and received a CVSS v3.1 base score of 9.8 (CRITICAL), indicating the highest severity level (NVD).

Impact

If successfully exploited, this vulnerability could lead to arbitrary code execution on affected systems. The buffer overflow condition could allow an attacker to execute malicious code with the privileges of the Apache web server process. This could potentially lead to complete system compromise (Rapid7).

Mitigation and workarounds

The vulnerability was fixed in Apache HTTP Server version 2.4.52. Users are strongly recommended to upgrade to this version or later. For systems that cannot be immediately upgraded, it's worth noting that mod_lua is not enabled by default in Apache's package configuration in some distributions like Ubuntu (Ubuntu Security).

Community reactions

The vulnerability received significant attention from major technology companies and security vendors. Apple, Red Hat, and other major vendors issued security advisories and patches for their products that incorporate Apache HTTP Server. Multiple Linux distributions including Debian, Fedora, and Ubuntu released security updates to address the vulnerability (Debian Security, Fedora Update).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management