CVE-2024-38473 – Apache HTTP Server proxy encoding problem
https://notcve.org/view.php?id=CVE-2024-38473
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue. El problema de codificación en mod_proxy en Apache HTTP Server 2.4.59 y versiones anteriores permite que las URL de solicitud con codificación incorrecta se envíen a servicios backend, lo que potencialmente evita la autenticación mediante solicitudes manipuladas. Se recomienda a los usuarios actualizar a la versión 2.4.60, que soluciona este problema. A flaw was found in the mod_proxy module of httpd. Due to an encoding problem, specially crafted request URLs with incorrect encoding can be sent to backend services, potentially bypassing authentication. • https://github.com/Abdurahmon3236/CVE-2024-38473 https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template https://httpd.apache.org/security/vulnerabilities_24.html https://security.netapp.com/advisory/ntap-20240712-0001 https://access.redhat.com/security/cve/CVE-2024-38473 https://bugzilla.redhat.com/show_bug.cgi?id=2295012 • CWE-116: Improper Encoding or Escaping of Output •
CVE-2024-38472 – Apache HTTP Server on WIndows UNC SSRF
https://notcve.org/view.php?id=CVE-2024-38472
SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. SSRF en el servidor Apache HTTP en Windows permite potencialmente filtrar hashes NTML a un servidor malicioso a través de SSRF y solicitudes o contenido maliciosos. Se recomienda a los usuarios actualizar a la versión 2.4.60, que soluciona este problema. Nota: Las configuraciones existentes que acceden a rutas UNC deberán configurar la nueva directiva "UNCList" para permitir el acceso durante el procesamiento de solicitudes. • https://github.com/Abdurahmon3236/CVE-2024-38472 https://httpd.apache.org/security/vulnerabilities_24.html https://security.netapp.com/advisory/ntap-20240712-0001 https://access.redhat.com/security/cve/CVE-2024-38472 https://bugzilla.redhat.com/show_bug.cgi?id=2295011 • CWE-918: Server-Side Request Forgery (SSRF) •
CVE-2024-36387 – Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2
https://notcve.org/view.php?id=CVE-2024-36387
Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance. Ofrecer actualizaciones del protocolo WebSocket a través de una conexión HTTP/2 podría provocar una desreferencia del puntero nulo, lo que provocaría una falla del proceso del servidor y degradaría el rendimiento. • https://httpd.apache.org/security/vulnerabilities_24.html https://security.netapp.com/advisory/ntap-20240712-0001 • CWE-476: NULL Pointer Dereference •
CVE-2024-5261 – TLS certificate are not properly verified when utilizing LibreOfficeKit
https://notcve.org/view.php?id=CVE-2024-5261
Improper Certificate Validation vulnerability in LibreOffice "LibreOfficeKit" mode disables TLS certification verification LibreOfficeKit can be used for accessing LibreOffice functionality through C/C++. Typically this is used by third party components to reuse LibreOffice as a library to convert, view or otherwise interact with documents. LibreOffice internally makes use of "curl" to fetch remote resources such as images hosted on webservers. In affected versions of LibreOffice, when used in LibreOfficeKit mode only, then curl's TLS certification verification was disabled (CURLOPT_SSL_VERIFYPEER of false) In the fixed versions curl operates in LibreOfficeKit mode the same as in standard mode with CURLOPT_SSL_VERIFYPEER of true. This issue affects LibreOffice before version 24.2.4. • https://www.libreoffice.org/about-us/security/advisories/cve-2024-5261 • CWE-295: Improper Certificate Validation •
CVE-2024-29868 – Apache StreamPipes, Apache StreamPipes: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) in Recovery Token Generation
https://notcve.org/view.php?id=CVE-2024-29868
Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) vulnerability in Apache StreamPipes user self-registration and password recovery mechanism. This allows an attacker to guess the recovery token in a reasonable time and thereby to take over the attacked user's account. This issue affects Apache StreamPipes: from 0.69.0 through 0.93.0. Users are recommended to upgrade to version 0.95.0, which fixes the issue. Uso de la vulnerabilidad del generador de números pseudoaleatorios (PRNG) criptográficamente débil en el mecanismo de autorregistro de usuarios y recuperación de contraseñas de Apache StreamPipes. Esto permite a un atacante adivinar el token de recuperación en un tiempo razonable y así hacerse cargo de la cuenta del usuario atacado. Este problema afecta a Apache StreamPipes: desde 0.69.0 hasta 0.93.0. Se recomienda a los usuarios actualizar a la versión 0.95.0, que soluciona el problema. • https://github.com/DEVisions/CVE-2024-29868 https://lists.apache.org/thread/g7t7zctvq2fysrw1x17flnc12592nhx7 • CWE-338: Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) •