Skip to content
kat9541 edited this page Dec 18, 2016 · 5 revisions

The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."

  1. The fix commit for the vulnerability (a git hash):

  2. The commit that introduced the vulnerability (a git hash):

  3. A description of the coding mistake that led to the vulnerability:

    • HTTP Trailer headers were improperly handled when processing requests that were using chunked encoding. HTTP trailers could be used to replace HTTP headers late during request processing. Trailers were not being merged into headers properly. This could lead to a bypass of header restrictions defined with mod_headers.
  4. Who found it?

  5. Who fixed it?

  6. Is this code tested by automated tests?

    • Tests exist for the code, but there doesn't appear to be automated tests.
  7. Read the discussions about the code between introduction and fix

  8. Was there a bounty awarded? No

  9. Evidence of exploit

  10. Any mention of how it was found? Fuzzer? Manual?

    • No found mention, probably manual
  11. Any other interesting facts about this vulnerability that you would tell someone

Clone this wiki locally