Mageia 2021-0470: apache security update
Summary
It was found that the fix for CVE-2021-41773 in Apache HTTP Server 2.4.50 was
insufficient. An attacker could use a path traversal attack to map URLs to files
outside the directories configured by Alias-like directives. If files outside of
these directories are not protected by the usual default configuration "require
all denied", these requests can succeed. If CGI scripts are also enabled for
these aliased pathes, this could allow for remote code execution
(CVE-2021-42013).
References
- https://bugs.mageia.org/show_bug.cgi?id=29536
- https://downloads.apache.org/httpd/Announcement2.4.html
- - https://httpd.apache.org/security/vulnerabilities_24.html
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-42013
Resolution
MGASA-2021-0470 - Updated apache packages fix security vulnerability
SRPMS
- 8/core/apache-2.4.51-1.mga8