185.251.12.205
{
"scan_id": 1744881856,
"ip": "185.251.12.205",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "185.251.12.0/24",
"postal_code": "2811",
"coordinates": {
"latitude": "47.6133",
"longitude": "16.2765"
},
"geo_point": "47.6133, 16.2765",
"locale_code": "en",
"continent": "Europe",
"country_code": "AT",
"country_name": "Austria",
"city": "Wiesmath"
},
"location_updated_at": "2025-04-16T16:40:59Z",
"asn": {
"number": "AS211510",
"organization": "RDI Solutions e.U.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "185.251.12.0/24",
"organization": "RDI Solution e.U.",
"descr": "RDI Solution e.U.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T08:53:36Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2025-04-16T16:40:59Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2025-04-16T23:46:45Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2025-04-16T16:40:59Z"
}
],
"services": [
{
"port": 25,
"protocol": "tcp",
"name": "smtp",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "",
"modules": {
"smtp": {
"banner": "220 mail.pbeg.at ESMTP ready\r\n"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "keyid315307598c8ec6aa735096cb0d97f7f1b8461061\ndirname/c=at/st=na/l=kirchschlag/o=serviceit gmbh/ou=ou/cn=sophos_ca_c23076bgqkm9t29/[email protected]\nserial9c0f494bac4fee32",
"basic_constraints": {
"is_ca": true
},
"subject_key_id": "315307598c8ec6aa735096cb0d97f7f1b8461061"
},
"fingerprint_md5": "FA81F47EA3683E9317B2155F51CB10D4",
"fingerprint_sha1": "BFFBBF3A297C781B624818E827DFECBAB984FD1D",
"fingerprint_sha256": "0CC148D3D6579385CB3B300B3B115A12AC60C0EA9F6241D7FB23268C4E3D6CF2",
"issuer": {
"common_name": [
"Sophos_CA_C23076BGQKM9T29"
],
"country": [
"AT"
],
"email_address": [
"[email protected]"
],
"locality": [
"Kirchschlag"
],
"organization": [
"serviceIT GmbH"
],
"organizational_unit": [
"OU"
],
"province": [
"NA"
]
},
"issuer_dn": "/C=AT/ST=NA/L=Kirchschlag/O=serviceIT GmbH/OU=OU/CN=Sophos_CA_C23076BGQKM9T29/[email protected]",
"jarm": "00000000000000000000000000000000000000000000000000000000000000",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "11245287383929712178",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"Sophos_CA_C23076BGQKM9T29"
],
"country": [
"AT"
],
"email_address": [
"[email protected]"
],
"locality": [
"Kirchschlag"
],
"organization": [
"serviceIT GmbH"
],
"organizational_unit": [
"OU"
],
"province": [
"NA"
]
},
"subject_alt_name": {
"dns_names": [
"Sophos_CA_C23076BGQKM9T29"
],
"extended_dns_names": []
},
"subject_dn": "/C=AT/ST=NA/L=Kirchschlag/O=serviceIT GmbH/OU=OU/CN=Sophos_CA_C23076BGQKM9T29/[email protected]",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "81b48c5a51f037f512330c7808788f0f7c246736a515d5e9764e37058d55d98d",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "e3ff387b75c2373b500e0fbad2710e6f6da98c3c332d161c7fefa9f8ed76fcd9",
"validation_level": "OV",
"validity": {
"length_seconds": 508464000,
"not_after": "2036-12-31T09:50:28",
"not_before": "2020-11-20T09:50:28"
},
"version": 2
},
"fingerprint_sha256": "0CC148D3D6579385CB3B300B3B115A12AC60C0EA9F6241D7FB23268C4E3D6CF2",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted",
"self_signed",
"root"
]
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T21:29:42.259Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Apache httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:apache:http_server",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n<head>\n \n \n\n <meta charset=\"utf-8\"/>\n <meta http-equiv=\"X-UA-Compatible\" content=\"IE=Edge\"/>\n <meta HTTP-EQUIV='Pragma' CONTENT='no-cache'>\n <meta HTTP-EQUIV='Cache-Control' CONTENT='no-cache'>\n <title>Logon - SINEMA Remote Connect</title>\n\n <link rel=\"stylesheet\" href=\"/static/css/normalize.css? 1745017079\"/>\n <link rel=\"stylesheet\" href=\"/static/css/layout.css? 1745017079\"/>\n <link rel=\"stylesheet\" href=\"/static/css/login.css? 1745017079\"/>\n <link rel=\"stylesheet\" href=\"/static/css/font-awesome.css? 1745017079\"/>\n <link rel=\"stylesheet\" href=\"/static/css/siemens-sans.css\"/>\n\n <script type=\"text/javascript\" src=\"/static/js/jquery.min.js\"></script>\n <script type=\"text/javascript\" src=\"/static/js/sinemarc.js\"></script>\n\n \n \n\n</head>\n<body>\n\n\n\n<div class=\"header-wrapper\">\n <div class=\"top-header\">\n <img src=\"/static/img/logo.gif\" alt=\"SIEMENS\" class=\"logo\"/>\n <div class=\"product-name\">SINEMA Remote Connect</div>\n </div>\n <div class=\"sub-header\">\n <div class=\"clock\">1745017079#en#0#</div>\n <div class=\"subheader-right\">\n \n <div class=\"language-selector\">\n <div active-language>\n English\n <span class=\"fa fa-chevron-down\"></span>\n </div>\n <div class=\"language-select-menu menu\">\n <form action=\"/i18n/setlang/\" method=\"post\">\n <input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"dbSHIJIqh1cOlWEXJfRqjsun74dsmvDyi7GFqDBZlt2JTZ02PGZdkAfLyssHECi0\">\n \n <button type=\"submit\" name=\"language\" value=\"de\"\n class=\"\">\n German\n \n </button>\n \n <button type=\"submit\" name=\"language\" value=\"en\"\n class=\"selected\">\n English\n <span class=\"correct-icon\"></span>\n </button>\n \n </form>\n </div>\n </div>\n \n <div class=\"header-divider\"></div>\n <div class=\"online-help\">\n <a href=\"#\" onClick=\"openHelpWindow('/static/help/en/login_help.htm');\">\n <i class=\"online-help-icon\"></i>\n </a>\n </div>\n </div>\n\n </div>\n</div>\n\n\n<div class=\"content\">\n <div class=\"login-wrapper\">\n\n <div class=\"login-form-wrapper\">\n\n <div id=\"banner_text\">\n \n Welcome to SINEMA Remote Connect\n \n\n </div>\n\n <div class=\"login-tabs\">\n <ul>\n <li>\n <a id=\"localTab\" onclick=\"openLoginForm(event)\">Local</a>\n </li>\n \n <li>\n <a class=\"tablinks\" disabled>UMC</a>\n </li>\n \n </ul>\n\n </div>\n\n \n\n \n\n \n\n <div id=\"local\" class=\"tabcontent\" style=\"display: block;\">\n <form action=\"/wbm/login/\" method=\"POST\" class=\"login-form\">\n <input type=\"hidden\" name=\"csrfmiddlewaretoken\" value=\"dbSHIJIqh1cOlWEXJfRqjsun74dsmvDyi7GFqDBZlt2JTZ02PGZdkAfLyssHECi0\">\n <input id=\"id_utcoffset\" name=\"utcoffset\" type=\"hidden\" value=\"0\"/>\n\n <div class=\"form-row\">\n <label for=\"id_username\">User name:</label>\n <input type=\"text\" name=\"username\" autofocus required id=\"id_username\">\n </div>\n\n <div class=\"form-row\">\n <label for=\"id_password\">Password:</label>\n <input id=\"id_password\" name=\"password\" type=\"password\" autocomplete=\"off\"/>\n </div>\n\n \n\n <div class=\"form-row\">\n <label> </label>\n <button id=\"id_submit\" type=\"submit\"><span class=\"button\">Log on</span></button>\n </div>\n\n </form>\n </div>\n <div id=\"umc\" class=\"tabcontent\">\n \n </div>\n </div>\n\n <div class=\"pki\">\n \n <img src=\"/static/img/chip-icon.png\">\n \n <p> PKI Login </p>\n </div>\n </div>\n</div>\n\n<script type=\"text/javascript\">\n var d = new Date();\n $(\"#id_utcoffset\").prop('value', d.getTimezoneOffset() * -1);\n\n var usernameInput = $(\"#id_username\");\n usernameInput.focus().val(usernameInput.val());\n</script>\n\n<script type=\"text/javascript\">\n var isUmcFailed = \"None\" === \"None\" ? false : true;\n var iUMCActive = \"False\" === \"True\" ? true : false;\n $(document).ready(function () {\n if (isUmcFailed) {\n if (!iUMCActive) {\n toggleLoginForm(\"localTab\");\n } else {\n toggleLoginForm(\"umcTab\");\n }\n } else {\n toggleLoginForm(\"localTab\");\n }\n });\n\n function toggleLoginForm(formName) {\n if (formName === \"localTab\") {\n $('#umcTab').removeClass(\"active\");\n $('#localTab').addClass(\"active\");\n $(\"#umc\").css(\"display\", \"none\");\n $(\"#local\").css(\"display\", \"block\");\n } else {\n $('#localTab').removeClass(\"active\");\n $('#umcTab').addClass(\"active\");\n $(\"#local\").css(\"display\", \"none\");\n $(\"#umc\").css(\"display\", \"block\");\n }\n }\n\n function openLoginForm(e) {\n toggleLoginForm(e.currentTarget.id);\n }\n</script>\n</body>\n</html>\n",
"body_murmur": 1683776586,
"body_sha256": "8a20f97a71773dd69be347dbc44812c39c2cf0fb9221226f9e37f17f4a9657dc",
"component": [
"Django",
"Python",
"Apache HTTP Server"
],
"content_length": 5906,
"headers": {
"cache_control": [
"no-cache, no-store, must-revalidate, private"
],
"content_language": [
"en"
],
"content_length": [
"5906"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Fri, 18 Apr 2025 22:57:59 GMT"
],
"expires": [
"Fri, 18 Apr 2025 22:57:59 GMT"
],
"pragma": [
"no-cache"
],
"server": [
"Apache"
],
"set_cookie": [
"csrftoken=J1rFFpCRDqcFYSj9X9ig0WjksQbtFWqyOXfDnjvqHS2AwVFe3Aq3144ITeqIX350; expires=Fri, 17 Apr 2026 22:57:59 GMT; HttpOnly; Max-Age=31449600; Path=/; SameSite=Lax; Secure",
"sessionid=49it2e84ndxzzvnu6c4pzcj4ptir6hdy; HttpOnly; Path=/; SameSite=Lax; Secure"
],
"strict_transport_security": [
"max-age=15768000"
],
"vary": [
"Cookie,Accept-Language"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"sameorigin"
],
"x_xss_protection": [
"1; mode=block"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"headers": {
"cache_control": [
"no-cache, no-store, must-revalidate, private"
],
"content_language": [
"en"
],
"content_length": [
"0"
],
"content_type": [
"text/html; charset=utf-8"
],
"date": [
"Fri, 18 Apr 2025 22:57:59 GMT"
],
"location": [
"/wbm/login/"
],
"pragma": [
"no-cache"
],
"server": [
"Apache"
],
"strict_transport_security": [
"max-age=15768000"
],
"vary": [
"Accept-Language,Cookie"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"sameorigin"
],
"x_xss_protection": [
"1; mode=block"
]
},
"location": "/wbm/login/",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Found"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://185.251.12.205"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "185.251.12.205",
"path": "/wbm/login/",
"scheme": "https"
}
},
"status_code": 200,
"title": "Logon - SINEMA Remote Connect"
},
"tls": {
"certificate": {
"extensions": {
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"siemens.pbeg.at"
],
"ip_address": [
"185.251.12.205",
"192.168.44.100",
"192.168.0.1"
]
}
},
"fingerprint_md5": "7B2F67AEC721174AEECF23A7597B684A",
"fingerprint_sha1": "8250B0D4EF2CF6DB491CC31519A63EDA282BF9B8",
"fingerprint_sha256": "3442801A2AA7268DB9B6721B07229D68D56F8A7826CCC4E261DC435750737841",
"issuer": {
"common_name": [
"CA 657762 SINEMA RC"
]
},
"issuer_dn": "/CN=CA 657762 SINEMA RC",
"jarm": "16d16d16d14d16d00016d16d16d16df572ac71996ec56855731b41418b2c77",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "124",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "OWIzYzA2MmZmNzdjMTdmNWNhZWE1M2I0MWUyZTRhZTQyNDQ2NTM2ZTVjZDYxYmM5ODI2ZmE5NWQyZTY3Y2FlMmNlY2UyYWNmODJkZjJiM2ViNmIwNGIzMjJkODllNmFkNzI1Y2FjYWY4MjgxMGUyMGY2N2Y0MzQ2ODA0YmFhMGFkMjVjMGIxOWE2ZmY4ODY5MWQwNGM5MjQ4M2Y2ODkyMjVmNTA4ZjU3MjgyOTQ1OTIzYjQ0ZDIyZjBiYWE1NTNiMzBjMmUxZTdlOTM1MDFkMGM4NGVhZjMxYjk0ZGFlMGQzZjJhMTY5ZTUwMDM2Zjc0ZTlkOTY4NmM4NDI4MjkwYjNjN2NmNDI1MDcyNDljNGRjNzZjMjYwMDU2Y2JjYjliMjJkNzEyODI5OTJkODkzOGJhMTg1MjU4MjNjM2FiODFhZjNmZjNkM2NjODhjNmEzYjY3MTM3OWYyYTJhMmJmOGEwMTMxNDEwMjkwMTVmZjcwODkzMjRkNzliYmFiMWI2YTgyODg5ZDUwMGUwMjA4ZjAyMDVhODg1YzA2OWE3ZTAzZGY1MzczNjhkMjllNmU3M2M2NWE3YmM1MDRiMjkzMTVlNjY3M2U1MDQxOTZmNGIzZTgxZGFiNGE5YmQzNzc5OTk0ZTEzNWJjY2Q2ZGQ3MGE5NWRkZDFjM2QxYTk5YjI="
},
"subject": {
"common_name": [
"siemens.pbeg.at"
]
},
"subject_alt_name": {
"dns_names": [
"siemens.pbeg.at"
],
"extended_dns_names": [
{
"domain": "pbeg",
"fld": "pbeg.at",
"subdomain": "siemens",
"tld": "at"
}
]
},
"subject_dn": "/CN=siemens.pbeg.at",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "6c39a6452c74bd8c2071a379610bef1895d43c26b396c2a592ff6290ce05bc30",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "MHhiNzRiOGI0ZWU2M2UxYjU0N2QyYzMzY2MzZmY1MjUwOGYyNTkzODM1YjcwYjZiOWNlYWY2YzM5NDhkOGUyMTRiMzU1MTUwMmYwNDdhMmIxNDlkYmQzYTE4MDhhYzNhNzIzZGIzNzI0NDI5MmVkOWYxNmM2NjEzMTg2ZWFkNzZkZDMxYTljOGIxMTI2Zjc0ZjQ2ZGJjNmJmZjA3YmRjY2Y1YWRjNTMyOWU1OTY0ZWI4NmMyMDYzMzQxMTY2ZDZlZDdiMzFiYzJmNzE0MzVkZmU2YTNiYmQ1MTQwNDRiMWViNGVjZDNkZmUxMDIzZTFkZDk4YWVkMzg3ZWUxOWU2NDIwMzE3MWM2OWM2OGRmNDc3MzFhZDg1OTEwZWUwM2YyMWEyZDQ2ZDBlNGFmYWRiYjcwZGI1OTE1YTJiNTAyYjAyYjU4ZWJlYWI4ZmE2NGZiNjlkNTRmYzFiMGIwNDkyNTg0MGU0ODQ4NzdhZWQ1M2E4YzFjZGVhZjYzMjUxZjI4NzI1MjBhOTkyZDUxMGIxYjY5M2Y3NWE5ODJkOTlkNDIxMmJjMGVjMDMwYjdmZGY2OTM5ZGM4YjYwMmE5MDY4ZDJlYmU5YjkyMTk4OTIzOGUxN2Q5ZGEyYzUyNjU0ZmViNzUyOGM2OGUxOGI1YjRhYjllNzFhZjIyODExM2I5NmIyYg=="
}
},
"tbs_fingerprint": "63b2695df88f108d65bc062dd887b23d81f1be1cc9c26a02c83e5f6158ecfb71",
"validation_level": "DV",
"validity": {
"length_seconds": 31708800,
"not_after": "2025-04-28T09:09:10",
"not_before": "2024-04-26T09:09:10"
},
"version": 2
},
"fingerprint_sha256": "3442801A2AA7268DB9B6721B07229D68D56F8A7826CCC4E261DC435750737841",
"precert": false,
"raw": "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",
"tags": [
"dv",
"trusted"
]
}
},
"cve": [
{
"id": "CVE-1999-0070",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1199",
"score": 10,
"severity": "high"
},
{
"id": "CVE-2023-25690",
"score": 9.8,
"severity": "critical"
}
],
"url": "https://185.251.12.205/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2025-04-18T23:52:46.081Z"
}
],
"services_hash": "437d2d6a73fffcbf799336e0c14181b06b647184a0bae4bb72e51cae4b78c02c",
"last_updated_at": "2025-04-18T23:52:46.081Z",
"banner": [
"smtp",
"tls",
"http"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0070": {
"id": "CVE-1999-0070",
"references": [
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
],
"score": 5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "test-cgi program allows an attacker to list files on the server.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-1999-1199": {
"id": "CVE-1999-1199",
"references": [
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
],
"score": 10,
"services": [
"443/http"
],
"severity": "high",
"summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2023-25690": {
"id": "CVE-2023-25690",
"references": [
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01",
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9.8,
"services": [
"443/http"
],
"severity": "critical",
"summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2023-27522": {
"id": "CVE-2023-27522",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 7.5,
"services": [
"443/http"
],
"severity": "high",
"summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
}
}
}