Lucene search

K
hackeroneJavier_sensepostH1:241610
HistoryJun 20, 2017 - 8:36 a.m.

Internet Bug Bounty: ap_find_token() Buffer Overread

2017-06-2008:36:29
javier_sensepost
hackerone.com
139

0.273 Low

EPSS

Percentile

96.8%

Versions Affected:
httpd 2.2.32
httpd 2.4.24 (unreleased)
httpd 2.4.25

Description:
The HTTP strict parsing changes added in 2.2.32 and 2.4.24 introduced a
bug in token list parsing, which allows ap_find_token() to search past
the end of its input string. By maliciously crafting a sequence of
request headers, an attacker may be able to cause a segmentation fault,
or to force ap_find_token() to return an incorrect value.

Mitigation:
2.2.32 users should either apply the patch available at
https://www.apache.org/dist/httpd/patches/apply_to_2.2.32/CVE-2017-7668.patch
or upgrade in the future to 2.2.33, which is currently unreleased.

2.4.25 users should upgrade to 2.4.26.

You can contact me on [email protected] or [email protected]

I would like to donate the bug bounty’s money (if any) to charity and preferably do it in behalf of my company, SensePost…