39.105.115.154
{
"scan_id": 1767951438,
"ip": "39.105.115.154",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "39.104.0.0/14",
"postal_code": "",
"coordinates": {
"latitude": "39.911",
"longitude": "116.395"
},
"geo_point": "39.911, 116.395",
"locale_code": "en",
"continent": "Asia",
"country_code": "CN",
"country_name": "China",
"city": "Beijing"
},
"location_updated_at": "2026-01-09T18:15:14Z",
"asn": {
"number": "AS37963",
"organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "39.104.0.0/14",
"organization": "Hangzhou Alibaba Advertising Co.,Ltd.",
"descr": "Hangzhou Alibaba Advertising Co.,Ltd.",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-12-09T11:26:59Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2026-01-09T18:15:14Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2026-01-09T21:20:45Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2026-01-09T18:15:14Z"
}
],
"services": [
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "2.0",
"product": "Microsoft HTTPAPI httpd",
"extra_info": "SSDP/UPnP",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.01//EN\"\"http://www.w3.org/TR/html4/strict.dtd\">\r\n<HTML><HEAD><TITLE>Not Found</TITLE>\r\n<META HTTP-EQUIV=\"Content-Type\" Content=\"text/html; charset=us-ascii\"></HEAD>\r\n<BODY><h2>Not Found</h2>\r\n<hr><p>HTTP Error 404. The requested resource is not found.</p>\r\n</BODY></HTML>\r\n",
"body_murmur": 1489525118,
"body_sha256": "ce7127c38e30e92a021ed2bd09287713c6a923db9ffdb43f126e8965d777fbf0",
"component": [
"Microsoft HTTPAPI:2.0"
],
"content_length": 315,
"headers": {
"content_length": [
"315"
],
"content_type": [
"text/html; charset=us-ascii"
],
"date": [
"Fri, 09 Jan 2026 07:39:43 GMT"
],
"server": [
"Microsoft-HTTPAPI/2.0"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "39.105.115.154",
"path": "",
"scheme": "http"
}
},
"status_code": 404,
"title": "Not Found"
}
},
"url": "http://39.105.115.154/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-09T07:39:44.803Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "http",
"version": "",
"product": "Apache httpd",
"extra_info": "",
"tunnel": "ssl",
"softwares": [
{
"uri": "cpe:/a:apache:http_server",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\n<html><head>\n<title>401 Unauthorized</title>\n</head><body>\n<h1>Unauthorized</h1>\n<p>This server could not verify that you\nare authorized to access the document\nrequested. Either you supplied the wrong\ncredentials (e.g., bad password), or your\nbrowser doesn't understand how to supply\nthe credentials required.</p>\n</body></html>\n",
"body_murmur": 864306896,
"body_sha256": "ff6d14f77e27f7b90cb2f20bce408189f5f388961f3fcd13fe2df2cc0a002dc3",
"component": [
"Apache HTTP Server"
],
"content_length": 381,
"headers": {
"content_length": [
"381"
],
"content_type": [
"text/html; charset=iso-8859-1"
],
"date": [
"Fri, 09 Jan 2026 16:59:20 GMT"
],
"server": [
"Apache"
],
"www_authenticate": [
"Basic realm=\"VisualSVN Server\""
],
"x_frame_options": [
"SAMEORIGIN"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "39.105.115.154",
"path": "",
"scheme": "https"
}
},
"status_code": 401,
"title": "401 Unauthorized"
},
"tls": {
"certificate": {
"extensions": {
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": true,
"decipher_only": false,
"digital_signature": false,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true
},
"subject_alt_name": {
"dns_names": [
"iZt7egwbse58aqZ"
]
}
},
"fingerprint_md5": "5CE66C2E6CD0112838AA4EA0F7A790F8",
"fingerprint_sha1": "0FE1FACEA99ED8E6C107F3238258766847F80C97",
"fingerprint_sha256": "D6C7D2899DE75BDA96FA51BC47A4BA1644DE99AEA2DD833EB57B647D3F4D1F89",
"issuer": {
"common_name": [
"iZt7egwbse58aqZ"
]
},
"issuer_dn": "/CN=iZt7egwbse58aqZ",
"jarm": "29d29d20d29d29d21c29d29d29d29d3ee7a9a63f9a04383f3ae006547495ae",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "14634407892783966699",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": true,
"value": "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"
},
"subject": {
"common_name": [
"iZt7egwbse58aqZ"
]
},
"subject_alt_name": {
"dns_names": [
"iZt7egwbse58aqZ"
],
"extended_dns_names": []
},
"subject_dn": "/CN=iZt7egwbse58aqZ",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "a9dda948f20be55bed6eb9cb0747af7e834f153b8d2d18b8e9109abbacf6df7a",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 2048,
"modulus": "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"
}
},
"tbs_fingerprint": "948ed9191b88c8551e310abbd0937395378c287fc0823322e5ac9d6c6d47bde2",
"validation_level": "DV",
"validity": {
"length_seconds": 315360000,
"not_after": "2028-04-11T20:27:14",
"not_before": "2018-04-14T20:27:14"
},
"version": 2
},
"fingerprint_sha256": "D6C7D2899DE75BDA96FA51BC47A4BA1644DE99AEA2DD833EB57B647D3F4D1F89",
"precert": false,
"raw": "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",
"tags": [
"dv",
"self_signed",
"root"
]
}
},
"cve": [
{
"id": "CVE-1999-0070",
"score": 5,
"severity": "medium"
},
{
"id": "CVE-1999-1199",
"score": 10,
"severity": "high"
},
{
"id": "CVE-2023-25690",
"score": 9.8,
"severity": "critical"
}
],
"url": "https://39.105.115.154/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-09T16:59:23.623Z"
},
{
"port": 1433,
"protocol": "tcp",
"name": "ms-sql-s",
"version": "13.00.5026; SP2",
"product": "Microsoft SQL Server 2016",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:microsoft:sql_server:2016:sp2",
"part": "a",
"vendor": "microsoft",
"product": "sql_server",
"version": "2016",
"language": "ANY",
"edition": "ANY",
"update": "sp2"
},
{
"uri": "cpe:/o:microsoft:windows",
"part": "o",
"vendor": "microsoft",
"product": "windows",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mssql": {
"encrypt_mode": "ENCRYPT_ON",
"instance_name": "",
"version": "13.0.5026"
}
},
"cve": [
{
"id": "CVE-2016-7249",
"score": 8.8,
"severity": "high"
},
{
"id": "CVE-2016-7250",
"score": 8.8,
"severity": "high"
},
{
"id": "CVE-2016-7251",
"score": 6.1,
"severity": "medium"
}
],
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-11T00:17:50.835Z"
},
{
"port": 3306,
"protocol": "tcp",
"name": "mysql",
"version": "5.7.23-log",
"product": "MySQL",
"extra_info": "",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mysql:mysql:5.7.23-log",
"part": "a",
"vendor": "mysql",
"product": "mysql",
"version": "5\\.7\\.23\\-log",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mysql": {
"capability_flags": {
"CLIENT_CAN_HANDLE_EXPIRED_PASSWORDS": true,
"CLIENT_COMPRESS": true,
"CLIENT_CONNECT_ATTRS": true,
"CLIENT_CONNECT_WITH_DB": true,
"CLIENT_DEPRECATED_EOF": true,
"CLIENT_FOUND_ROWS": true,
"CLIENT_IGNORE_SIGPIPE": true,
"CLIENT_IGNORE_SPACE": true,
"CLIENT_INTERACTIVE": true,
"CLIENT_LOCAL_FILES": true,
"CLIENT_LONG_FLAG": true,
"CLIENT_LONG_PASSWORD": true,
"CLIENT_MULTI_RESULTS": true,
"CLIENT_MULTI_STATEMENTS": true,
"CLIENT_NO_SCHEMA": true,
"CLIENT_ODBC": true,
"CLIENT_PLUGIN_AUTH": true,
"CLIENT_PLUGIN_AUTH_LEN_ENC_CLIENT_DATA": true,
"CLIENT_PROTOCOL_41": true,
"CLIENT_PS_MULTI_RESULTS": true,
"CLIENT_RESERVED": true,
"CLIENT_SECURE_CONNECTION": true,
"CLIENT_SESSION_TRACK": true,
"CLIENT_SSL": true,
"CLIENT_TRANSACTIONS": true
},
"protocol_version": 10,
"version": "5.7.23-log"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-11T02:44:26.353Z"
},
{
"port": 27017,
"protocol": "tcp",
"name": "mongodb",
"version": "2.3.2 - 4.1.0",
"product": "MongoDB",
"extra_info": "not authorized; database: test",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:mongodb:mongodb",
"part": "a",
"vendor": "mongodb",
"product": "mongodb",
"version": "ANY",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"mongodb": {
"allocator": "tcmalloc",
"bits": 64,
"cc": "cl: Microsoft (R) C/C++ Optimizing Compiler Version 19.00.24223 for x64",
"cc_flags": "/nologo /EHsc /W3 /wd4355 /wd4800 /wd4267 /wd4244 /wd4290 /wd4068 /wd4351 /we4013 /we4099 /we4930 /Z7 /errorReport:none /MD /O2 /Oy- /bigobj /Gw /Gy /Zc:inline",
"cxx": "cl: Microsoft (R) C/C++ Optimizing Compiler Version 19.00.24223 for x64",
"cxx_flags": "/TP",
"databases": null,
"dist_arch": "x86_64",
"dist_mod": "2008plus-ssl",
"git_version": "7c14a47868643bb691a507a92fe25541f998eca4",
"is_master": true,
"javascript_engine": "mozjs",
"link_flags": "/nologo /DEBUG /INCREMENTAL:NO /LARGEADDRESSAWARE /OPT:REF",
"logical_session_timeout_minutes": 0,
"max_bson_object_size": 16777216,
"max_message_size_bytes": 48000000,
"max_wire_version": 5,
"max_write_batch_size": 1000,
"read_only": false,
"storage_engines": [
"devnull",
"ephemeralForTest",
"mmapv1",
"wiredTiger"
],
"sys_info": "deprecated",
"target_arch": "x86_64",
"target_os": "windows",
"total_size": 0,
"version": "3.4.17"
}
},
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2026-01-10T16:37:31.502Z"
}
],
"services_hash": "74e62b160e4cc5d6fd99dd04c6adfa21365ba91bedc85481e2671eb92026c2c4",
"last_updated_at": "2026-01-11T02:44:26.353Z",
"banner": [
"mssql",
"mysql",
"mongodb",
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-1999-0070": {
"id": "CVE-1999-0070",
"references": [
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E"
],
"score": 5,
"services": [
"443/http"
],
"severity": "medium",
"summary": "test-cgi program allows an attacker to list files on the server.",
"vector_string": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"weakness": "NVD-CWE-noinfo"
},
"CVE-1999-1199": {
"id": "CVE-1999-1199",
"references": [
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E",
"http://marc.info/?l=bugtraq&m=90252779826784&w=2",
"http://marc.info/?l=bugtraq&m=90276683825862&w=2",
"http://marc.info/?l=bugtraq&m=90280517007869&w=2",
"http://marc.info/?l=bugtraq&m=90286768232093&w=2",
"http://www.redhat.com/support/errata/rh51-errata-general.html#apache",
"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E",
"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E"
],
"score": 10,
"services": [
"443/http"
],
"severity": "high",
"summary": "Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability.",
"vector_string": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"weakness": "NVD-CWE-Other"
},
"CVE-2016-7249": {
"id": "CVE-2016-7249",
"references": [
"http://www.securityfocus.com/bid/94037",
"http://www.securitytracker.com/id/1037250",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-136"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2016 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka \"SQL RDBMS Engine Elevation of Privilege Vulnerability.\"",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-264"
},
"CVE-2016-7250": {
"id": "CVE-2016-7250",
"references": [
"http://www.securityfocus.com/bid/94060",
"http://www.securitytracker.com/id/1037250",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-136"
],
"score": 8.8,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server 2014 SP1, 2014 SP2, and 2016 does not properly perform a cast of an unspecified pointer, which allows remote authenticated users to gain privileges via unknown vectors, aka \"SQL RDBMS Engine Elevation of Privilege Vulnerability.\"",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-264"
},
"CVE-2016-7251": {
"id": "CVE-2016-7251",
"references": [
"http://www.securityfocus.com/bid/94043",
"http://www.securitytracker.com/id/1037250",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-136"
],
"score": 6.1,
"services": [
"1433/ms-sql-s"
],
"severity": "medium",
"summary": "Cross-site scripting (XSS) vulnerability in the MDS API in Microsoft SQL Server 2016 allows remote attackers to inject arbitrary web script or HTML via an unspecified parameter, aka \"MDS API XSS Vulnerability.\"",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"weakness": "CWE-79"
},
"CVE-2016-7252": {
"id": "CVE-2016-7252",
"references": [
"http://www.securityfocus.com/bid/94050",
"http://www.securitytracker.com/id/1037250",
"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2016/ms16-136"
],
"score": 6.5,
"services": [
"1433/ms-sql-s"
],
"severity": "medium",
"summary": "Microsoft SQL Server 2016 mishandles the FILESTREAM path, which allows remote authenticated users to gain privileges via unspecified vectors, aka \"SQL Analysis Services Information Disclosure Vulnerability.\"",
"vector_string": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2017-8516": {
"id": "CVE-2017-8516",
"references": [
"http://www.securityfocus.com/bid/100041",
"http://www.securitytracker.com/id/1039110",
"https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8516"
],
"score": 7.5,
"services": [
"1433/ms-sql-s"
],
"severity": "high",
"summary": "Microsoft SQL Server Analysis Services in Microsoft SQL Server 2012, Microsoft SQL Server 2014, and Microsoft SQL Server 2016 allows an information disclosure vulnerability when it improperly enforces permissions, aka \"Microsoft SQL Server Analysis Services Information Disclosure Vulnerability\".",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-200"
},
"CVE-2023-25690": {
"id": "CVE-2023-25690",
"references": [
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01",
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9.8,
"services": [
"443/http"
],
"severity": "critical",
"summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2023-27522": {
"id": "CVE-2023-27522",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 7.5,
"services": [
"443/http"
],
"severity": "high",
"summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.nnSpecial characters in the origin response header can truncate/split the response forwarded to the client.nnn",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
}
}
}