000023480 - Apache vulnerability 'Apache HTTP Server mod_rewrite' from scan

Document created by RSA Customer Support Employee on Jun 14, 2016Last modified by RSA Customer Support Employee on Apr 21, 2017
Version 5Show Document
  • View in full screen mode

Article Content

Article Number000023480
Applies ToRSA Certificate Manager
RSA Registration Manager
Keon Certificate Authority
Apache Webserver
IssueApache vulnerability "Apache HTTP Server mod_rewrite" from scan
ISOC detected high vulnerabilities "Apache HTTP Server mod_rewrite Vulnerability" on the web servers.

The Apache HTTP Server mod rewrite vulnerability exists in Apache that may allow for code execution or a denial of service.

Apache is a popular, open source web server application.  A vulnerability is present in Apache that may allow remote code execution or a denial of service attack. The flaws reside in the mod_rewrite module through:

1) allowing control of a portion of a rewritten URL, and
2) no flag control is available such as Forbidden, Gone or NoEscape.

The default installation of Apache is not vulnerable as it does not include use of this rewrite module. Recommendation:

The vendor has made updates available for remediation here:
<http://httpd.apache.org/>  Sun Microsystems has released patches for affected Solaris 8, 9, and 10 systems. Please refer to the vendor's advisories for more information:
<http://sunsolve.sun.com/search/document.do?assetkey=1-26-102662-1>
<http://sunsolve.sun.com/search/document.do?assetkey=1-26-102663-1>
Cause
 RSA Certificate Manager (RCM) and RSA Registration Manager (RRM) web servers are compiled with mod_rewrite module. 
ResolutionOn Windows, running the following command from the WebServer\bin directory lists the modules that are compiled with Apache:

 apache -l

But the rewrite engine is turned on only for SCEP server. The rule RCM uses is listed below, and as per this rule, the URL http://myserver:446/<jur_id>/pkiclient.exe gets converted to http://myserver:446/pkiclient.exe?id=<jur_id>:

 RewriteRule ^/([^/]*)/pkiclient.exe /pkiclient.exe?id=$1 [QSA]

Based on this, RCM and RRM are not susceptible.
NotesAlso see solution KCA Apache web server showing security vulnerability with scan due patch level/version
BZ 46551
Legacy Article IDa34164

Attachments

    Outcomes