CVE-2023-25690
Apache HTTP Server vulnerability analysis and mitigation

Overview

A critical vulnerability (CVE-2023-25690) was discovered in Apache HTTP Server versions 2.4.0 through 2.4.55. The vulnerability affects configurations where modproxy is enabled along with RewriteRule or ProxyPassMatch, specifically when non-specific patterns match user-supplied request-target (URL) data that is then re-inserted into the proxied request-target using variable substitution. The vulnerability was disclosed on March 7, 2023, and was fixed in Apache HTTP Server version 2.4.56 ([Apache Security](https://httpd.apache.org/security/vulnerabilities24.html)).

Technical details

The vulnerability occurs when mod_proxy is enabled alongside RewriteRule or ProxyPassMatch configurations. A specific example of a vulnerable configuration would be: 'RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/'. The vulnerability is particularly concerning when the configuration passes user-controlled data into a query string. For instance, a RewriteRule that passes user data after the ? (start of the query string) is exploitable, while even small changes to this pattern can prevent exploitation (SOCRadar Report).

Impact

The vulnerability can lead to several serious security implications including bypass of access controls in the proxy server, proxying of unintended URLs to existing origin servers, and cache poisoning. This is particularly critical in configurations where the proxy server is considered a security boundary (Apache Security, SOCRadar Report).

Mitigation and workarounds

The primary mitigation is to upgrade to Apache HTTP Server version 2.4.56 or later. For configurations using RewriteRule entries that include back-references and flags '[L,NC]', additional escaping flags such as '[B=?,BNP,QSA]' may be required. Some previously accepted RewriteRule directives that were out-of-specification are now rejected with error AH10409 (Debian Advisory).

Community reactions

The vulnerability has gained significant attention in the security community, with multiple vendors and organizations releasing advisories and patches. Major Linux distributions like Debian and Red Hat have issued security updates to address the vulnerability (Debian Advisory, Red Hat Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management