CVE-2019-17567 vulnerability in Apache and Other Products
Published on June 10, 2021
mod_proxy_wstunnel tunneling of non Upgraded connections
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
Products Associated with CVE-2019-17567
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2019-17567 are published in these products:
Affected Versions
Apache Software Foundation Apache HTTP Server:- Version 2.4.46 is affected.
- Version 2.4.43 is affected.
- Version 2.4.41 is affected.
- Version 2.4.39 is affected.
- Version 2.4.38 is affected.
- Version 2.4.37 is affected.
- Version 2.4.35 is affected.
- Version 2.4.34 is affected.
- Version 2.4.33 is affected.
- Version 2.4.29 is affected.
- Version 2.4.28 is affected.
- Version 2.4.27 is affected.
- Version 2.4.26 is affected.
- Version 2.4.25 is affected.
- Version 2.4.23 is affected.
- Version 2.4.20 is affected.
- Version 2.4.18 is affected.
- Version 2.4.17 is affected.
- Version 2.4.16 is affected.
- Version 2.4.12 is affected.
- Version 2.4.10 is affected.
- Version 2.4.9 is affected.
- Version 2.4.7 is affected.
- Version 2.4.6 is affected.
Exploit Probability
EPSS
12.44%
Percentile
93.76%
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.