Unpatched Apache reverse proxy flaw allows access to internal network
by GadgetGizmodo
IASI, ROMANIA (11/25/2011) - A yet-to-be-patched flaw discovered in the Apache HTTP server allows attackers to access protected resources on the internal network if some rewrite rules are not defined properly.
The vulnerability affects Apache installations that operate in reverse proxy mode, a type of configuration used for load balancing, caching and other operations that involve the distribution of resources over multiple servers.
In order to set up Apache HTTPD to run as a reverse proxy, server administrators use specialized modules like mod_proxy and mod_rewrite.
Security researchers from Qualys warn that if certain rules are not configured correctly, attackers can trick servers into performing unauthorized requests to access internal resources.
The problem isnât new and a vulnerability that allowed similar attacks was addressed back in October. However, while reviewing the patch for it, Qualys researcher Prutha Parikh realized that it can be bypassed due to a bug in the procedure for URI (Uniform Resource Identifier) scheme stripping. The scheme is the URI part that comes before the colon â:â character, such as http, ftp or file.
One relatively common rewrite and proxying rule is â^(.*) http://internal_host$1â, which redirects the request to the machine internal_host. However, if this is used and the server receives, for example, a request for âhost::portâ (with two colons), the âhost:â part is stripped and the rest is appended to http://internal_host in order to forward it internally.
The problem is that in this case, the remaining part is â:portâ, therefore transforming the forwarded request into http://internal_host:port, an unintended behavior that can result in the exposure of a protected resource.
In order to mitigate the problem server administrators should add a forward slash before $1 in the rewrite rule, the correct form being â^(.*)Â http://internal_host/$1â, Parikh said.
The Apache developers are aware of the problem and are currently discussing the best method of fixing it. One possibility would be to strengthen the previous patch in the server code in order to reject such requests, however, thereâs no certainty that other bypass methods wonât be discovered.
âWe could try improve that fix, but I think it would be simpler to change the translate_name hooks in mod_proxy and mod_rewrite to enforce the requirement in the ârightâ place,â said Red Hat senior software engineer Joe Orton on the Apache dev mailing list. Orton proposed a patchthat is currently being reviewed by the other developers.
Powered By WizardRSS.com | Full Text RSS Feed | Amazon Plugin | Settlement Statement
0 comments:
Leave a Comment