Arch Linux 754 Published by

An apache security update is available for Arch Linux.



Arch Linux Security Advisory ASA-202004-14
==========================================

Severity: Low
Date : 2020-04-15
CVE-ID : CVE-2020-1927 CVE-2020-1934
Package : apache
Type : multiple issues
Remote : Yes
Link :   https://security.archlinux.org/AVG-1126

Summary
=======

The package apache before version 2.4.43-1 is vulnerable to multiple
issues including information disclosure and open redirect.

Resolution
==========

Upgrade to 2.4.43-1.

# pacman -Syu "apache>=2.4.43-1"

The problems have been fixed upstream in version 2.4.43.

Workaround
==========

None.

Description
===========

- CVE-2020-1927 (open redirect)

A security issue has been found in Apache HTTP Server from 2.4.0 up to
and including 2.4.41, in the mod_rewrite module, where redirects that
were intended to be self-referential might be fooled by encoded
newlines and redirect instead to an an unexpected URL within the
request URL.
This is the same defect as CVE-2019-10098. The fix for CVE-2019-10098
was ineffective.
Possible mitigations are the use of anchor captures as back-references,
or prefixing self-referential redirects with / or scheme, host, and
port.

- CVE-2020-1934 (information disclosure)

The use of an uninitialized value has been found in Apache HTTP Server
from 2.4.0 up to and including 2.4.41, in the mod_proxy_ftp module,
when proxying to a malicious FTP server.

Impact
======

A remote attacker is able to cause a redirect via a crafted HTTP
request, or disclose information when proxying to an FTP server.

References
==========

  https://httpd.apache.org/security/vulnerabilities_24.html
  https://seclists.org/oss-sec/2020/q2/3
  https://seclists.org/oss-sec/2020/q2/4
  https://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_ftp.c?r1=1873745&r2=1873744&pathrev=1873745
  https://security.archlinux.org/CVE-2020-1927
  https://security.archlinux.org/CVE-2020-1934