52.201.58.139
{
"scan_id": 1728450177,
"ip": "52.201.58.139",
"is_ipv4": true,
"is_ipv6": false,
"location": {
"network": "52.201.0.0/18",
"postal_code": "20149",
"coordinates": {
"latitude": "39.0469",
"longitude": "-77.4903"
},
"geo_point": "39.0469, -77.4903",
"locale_code": "en",
"continent": "North America",
"country_code": "US",
"country_name": "United States",
"city": "Ashburn"
},
"location_updated_at": "2024-04-17T06:31:20Z",
"asn": {
"number": "AS14618",
"organization": "AMAZON-AES",
"country_code": ""
},
"asn_updated_at": "0001-01-01T00:00:00Z",
"whois": {
"network": "52.200.0.0/13",
"organization": "Amazon EC2 IAD prefix",
"descr": "Amazon EC2 IAD prefix",
"_encoding": {
"raw": "BASE64"
}
},
"whois_updated_at": "2024-10-07T04:58:14Z",
"tags": [
{
"name": "is_anonymous_proxy",
"pretty_name": "Anonymous Proxy",
"value": false,
"last_updated_at": "2024-04-17T06:31:20Z"
},
{
"name": "is_cdn",
"pretty_name": "CDN",
"value": false,
"last_updated_at": "2024-10-11T15:28:51Z"
},
{
"name": "is_satellite_provider",
"pretty_name": "Satellite Provider",
"value": false,
"last_updated_at": "2024-04-17T06:31:20Z"
}
],
"hostnames": [
{
"name": "ec2-52-201-58-139.compute-1.amazonaws.com",
"last_updated_at": "2024-10-13T20:05:41.858043059Z"
}
],
"services": [
{
"port": 80,
"protocol": "tcp",
"name": "http",
"version": "2.4.52",
"product": "Apache httpd",
"extra_info": "(Ubuntu)",
"tunnel": "",
"softwares": [
{
"uri": "cpe:/a:apache:http_server:2.4.52",
"part": "a",
"vendor": "apache",
"product": "http_server",
"version": "2\\.4\\.52",
"language": "ANY",
"edition": "ANY",
"update": "ANY"
}
],
"modules": {
"http": {
"body": "<!DOCTYPE html PUBLIC \"-//W3C//DTD XHTML 1.0 Transitional//EN\" \"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd\">\n<html xmlns=\"http://www.w3.org/1999/xhtml\">\n <!--\n Modified from the Debian original for Ubuntu\n Last updated: 2022-03-22\n See: https://launchpad.net/bugs/1966004\n -->\n <head>\n <meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n <title>Apache2 Ubuntu Default Page: It works</title>\n <style type=\"text/css\" media=\"screen\">\n * {\n margin: 0px 0px 0px 0px;\n padding: 0px 0px 0px 0px;\n }\n\n body, html {\n padding: 3px 3px 3px 3px;\n\n background-color: #D8DBE2;\n\n font-family: Ubuntu, Verdana, sans-serif;\n font-size: 11pt;\n text-align: center;\n }\n\n div.main_page {\n position: relative;\n display: table;\n\n width: 800px;\n\n margin-bottom: 3px;\n margin-left: auto;\n margin-right: auto;\n padding: 0px 0px 0px 0px;\n\n border-width: 2px;\n border-color: #212738;\n border-style: solid;\n\n background-color: #FFFFFF;\n\n text-align: center;\n }\n\n div.page_header {\n height: 180px;\n width: 100%;\n\n background-color: #F5F6F7;\n }\n\n div.page_header span {\n margin: 15px 0px 0px 50px;\n\n font-size: 180%;\n font-weight: bold;\n }\n\n div.page_header img {\n margin: 3px 0px 0px 40px;\n\n border: 0px 0px 0px;\n }\n\n div.banner {\n padding: 9px 6px 9px 6px;\n background-color: #E9510E;\n color: #FFFFFF;\n font-weight: bold;\n font-size: 112%;\n text-align: center;\n position: absolute;\n left: 40%;\n bottom: 30px;\n width: 20%;\n }\n\n div.table_of_contents {\n clear: left;\n\n min-width: 200px;\n\n margin: 3px 3px 3px 3px;\n\n background-color: #FFFFFF;\n\n text-align: left;\n }\n\n div.table_of_contents_item {\n clear: left;\n\n width: 100%;\n\n margin: 4px 0px 0px 0px;\n\n background-color: #FFFFFF;\n\n color: #000000;\n text-align: left;\n }\n\n div.table_of_contents_item a {\n margin: 6px 0px 0px 6px;\n }\n\n div.content_section {\n margin: 3px 3px 3px 3px;\n\n background-color: #FFFFFF;\n\n text-align: left;\n }\n\n div.content_section_text {\n padding: 4px 8px 4px 8px;\n\n color: #000000;\n font-size: 100%;\n }\n\n div.content_section_text pre {\n margin: 8px 0px 8px 0px;\n padding: 8px 8px 8px 8px;\n\n border-width: 1px;\n border-style: dotted;\n border-color: #000000;\n\n background-color: #F5F6F7;\n\n font-style: italic;\n }\n\n div.content_section_text p {\n margin-bottom: 6px;\n }\n\n div.content_section_text ul, div.content_section_text li {\n padding: 4px 8px 4px 16px;\n }\n\n div.section_header {\n padding: 3px 6px 3px 6px;\n\n background-color: #8E9CB2;\n\n color: #FFFFFF;\n font-weight: bold;\n font-size: 112%;\n text-align: center;\n }\n\n div.section_header_grey {\n background-color: #9F9386;\n }\n\n .floating_element {\n position: relative;\n float: left;\n }\n\n div.table_of_contents_item a,\n div.content_section_text a {\n text-decoration: none;\n font-weight: bold;\n }\n\n div.table_of_contents_item a:link,\n div.table_of_contents_item a:visited,\n div.table_of_contents_item a:active {\n color: #000000;\n }\n\n div.table_of_contents_item a:hover {\n background-color: #000000;\n\n color: #FFFFFF;\n }\n\n div.content_section_text a:link,\n div.content_section_text a:visited,\n div.content_section_text a:active {\n background-color: #DCDFE6;\n\n color: #000000;\n }\n\n div.content_section_text a:hover {\n background-color: #000000;\n\n color: #DCDFE6;\n }\n\n div.validator {\n }\n </style>\n </head>\n <body>\n <div class=\"main_page\">\n <div class=\"page_header floating_element\">\n <img src=\"icons/ubuntu-logo.png\" alt=\"Ubuntu Logo\"\n style=\"width:184px;height:146px;\" class=\"floating_element\" />\n <div>\n <span style=\"margin-top: 1.5em;\" class=\"floating_element\">\n Apache2 Default Page\n </span>\n </div>\n <div class=\"banner\">\n <div id=\"about\"></div>\n It works!\n </div>\n\n </div>\n <div class=\"content_section floating_element\">\n <div class=\"content_section_text\">\n <p>\n This is the default welcome page used to test the correct \n operation of the Apache2 server after installation on Ubuntu systems.\n It is based on the equivalent page on Debian, from which the Ubuntu Apache\n packaging is derived.\n If you can read this page, it means that the Apache HTTP server installed at\n this site is working properly. You should <b>replace this file</b> (located at\n <tt>/var/www/html/index.html</tt>) before continuing to operate your HTTP server.\n </p>\n\n <p>\n If you are a normal user of this web site and don't know what this page is\n about, this probably means that the site is currently unavailable due to\n maintenance.\n If the problem persists, please contact the site's administrator.\n </p>\n\n </div>\n <div class=\"section_header\">\n <div id=\"changes\"></div>\n Configuration Overview\n </div>\n <div class=\"content_section_text\">\n <p>\n Ubuntu's Apache2 default configuration is different from the\n upstream default configuration, and split into several files optimized for\n interaction with Ubuntu tools. The configuration system is\n <b>fully documented in\n /usr/share/doc/apache2/README.Debian.gz</b>. Refer to this for the full\n documentation. Documentation for the web server itself can be\n found by accessing the <a href=\"/manual\">manual</a> if the <tt>apache2-doc</tt>\n package was installed on this server.\n </p>\n <p>\n The configuration layout for an Apache2 web server installation on Ubuntu systems is as follows:\n </p>\n <pre>\n/etc/apache2/\n|-- apache2.conf\n| `-- ports.conf\n|-- mods-enabled\n| |-- *.load\n| `-- *.conf\n|-- conf-enabled\n| `-- *.conf\n|-- sites-enabled\n| `-- *.conf\n </pre>\n <ul>\n <li>\n <tt>apache2.conf</tt> is the main configuration\n file. It puts the pieces together by including all remaining configuration\n files when starting up the web server.\n </li>\n\n <li>\n <tt>ports.conf</tt> is always included from the\n main configuration file. It is used to determine the listening ports for\n incoming connections, and this file can be customized anytime.\n </li>\n\n <li>\n Configuration files in the <tt>mods-enabled/</tt>,\n <tt>conf-enabled/</tt> and <tt>sites-enabled/</tt> directories contain\n particular configuration snippets which manage modules, global configuration\n fragments, or virtual host configurations, respectively.\n </li>\n\n <li>\n They are activated by symlinking available\n configuration files from their respective\n *-available/ counterparts. These should be managed\n by using our helpers\n <tt>\n a2enmod,\n a2dismod,\n </tt>\n <tt>\n a2ensite,\n a2dissite,\n </tt>\n and\n <tt>\n a2enconf,\n a2disconf\n </tt>. See their respective man pages for detailed information.\n </li>\n\n <li>\n The binary is called apache2 and is managed using systemd, so to\n start/stop the service use <tt>systemctl start apache2</tt> and\n <tt>systemctl stop apache2</tt>, and use <tt>systemctl status apache2</tt>\n and <tt>journalctl -u apache2</tt> to check status. <tt>system</tt>\n and <tt>apache2ctl</tt> can also be used for service management if\n desired.\n <b>Calling <tt>/usr/bin/apache2</tt> directly will not work</b> with the\n default configuration.\n </li>\n </ul>\n </div>\n\n <div class=\"section_header\">\n <div id=\"docroot\"></div>\n Document Roots\n </div>\n\n <div class=\"content_section_text\">\n <p>\n By default, Ubuntu does not allow access through the web browser to\n <em>any</em> file outside of those located in <tt>/var/www</tt>,\n <a href=\"http://httpd.apache.org/docs/2.4/mod/mod_userdir.html\" rel=\"nofollow\">public_html</a>\n directories (when enabled) and <tt>/usr/share</tt> (for web\n applications). If your site is using a web document root\n located elsewhere (such as in <tt>/srv</tt>) you may need to whitelist your\n document root directory in <tt>/etc/apache2/apache2.conf</tt>.\n </p>\n <p>\n The default Ubuntu document root is <tt>/var/www/html</tt>. You\n can make your own virtual hosts under /var/www.\n </p>\n </div>\n\n <div class=\"section_header\">\n <div id=\"bugs\"></div>\n Reporting Problems\n </div>\n <div class=\"content_section_text\">\n <p>\n Please use the <tt>ubuntu-bug</tt> tool to report bugs in the\n Apache2 package with Ubuntu. However, check <a\n href=\"https://bugs.launchpad.net/ubuntu/+source/apache2\"\n rel=\"nofollow\">existing bug reports</a> before reporting a new bug.\n </p>\n <p>\n Please report bugs specific to modules (such as PHP and others)\n to their respective packages, not to the web server itself.\n </p>\n </div>\n\n </div>\n </div>\n <div class=\"validator\">\n </div>\n </body>\n</html>\n",
"body_murmur": 1410093119,
"body_sha256": "6faef4d5d777fdcaa653766b0ac8b9ed32d0fd87f7dcd79f02ff524dd1b0eb69",
"component": [
"Apache HTTP Server:2.4.52",
"Ubuntu"
],
"content_length": -1,
"headers": {
"accept_ranges": [
"bytes"
],
"content_type": [
"text/html"
],
"date": [
"Sun, 13 Oct 2024 15:49:35 GMT"
],
"etag": [
"\"29af-611ccd0a80207-gzip\""
],
"last_modified": [
"Tue, 20 Feb 2024 09:27:11 GMT"
],
"server": [
"Apache/2.4.52 (Ubuntu)"
],
"vary": [
"Accept-Encoding"
]
},
"protocol": "HTTP/1.1",
"request": {
"headers": {
"accept": [
"*/*"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "52.201.58.139",
"path": "",
"scheme": "http"
}
},
"status_code": 200,
"title": "Apache2 Ubuntu Default Page: It works"
}
},
"cve": [
{
"id": "CVE-2006-20001",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2022-22719",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2022-22720",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2022-22721",
"score": 9.1,
"severity": "critical"
},
{
"id": "CVE-2022-23943",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2022-26377",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2022-28330",
"score": 5.3,
"severity": "medium"
},
{
"id": "CVE-2022-28614",
"score": 5.3,
"severity": "medium"
},
{
"id": "CVE-2022-28615",
"score": 9.1,
"severity": "critical"
},
{
"id": "CVE-2022-29404",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2022-30556",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2022-31813",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2022-36760",
"score": 9,
"severity": "critical"
},
{
"id": "CVE-2022-37436",
"score": 5.3,
"severity": "medium"
},
{
"id": "CVE-2023-25690",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2023-27522",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2023-31122",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2023-45802",
"score": 5.9,
"severity": "medium"
},
{
"id": "CVE-2024-27316",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2024-38474",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2024-38476",
"score": 9.8,
"severity": "critical"
},
{
"id": "CVE-2024-38477",
"score": 7.5,
"severity": "high"
},
{
"id": "CVE-2024-40898",
"score": 7.5,
"severity": "high"
}
],
"url": "http://52.201.58.139/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2024-10-13T19:13:11.791Z"
},
{
"port": 443,
"protocol": "tcp",
"name": "https",
"version": "",
"product": "",
"extra_info": "",
"tunnel": "ssl",
"modules": {
"http": {
"body": "<!DOCTYPE html>\n<html>\n\n<head>\n <meta charset=\"utf-8\">\n <meta http-equiv=\"Content-Type\" content=\"text/html; charset=UTF-8\" />\n <meta name=\"robots\" content=\"noindex, nofollow\">\n\n <meta name=\"viewport\" content=\"width=device-width,initial-scale=1\"/>\n <title>Login to IEM</title>\n <link rel=\"icon\" href=\"/auth/resources/frs8x/login/custom/img/favicon.ico\" />\n <link href=\"/auth/resources/frs8x/login/custom/css/styles.css\" rel=\"stylesheet\" />\n <link href=\"/auth/resources/frs8x/login/custom/css/ix-icons.css\" rel=\"stylesheet\" />\n <script src=\"/auth/resources/frs8x/login/custom/js/show-hide-password.js\" type=\"text/javascript\"></script>\n <script type=\"module\" src=\"/osbar/iema-os-bar/iema-os-bar.esm.js\"></script>\n <link rel=\"stylesheet\" href=\"/osbar/iema-os-bar/iema-os-bar.css\"/>\n</head>\n\n<body class=\"difads theme-brand-light\">\n <iema-os-bar app-info=\"/auth/resources/frs8x/login/custom/assets/app-info.json\" language=\"en\"></iema-os-bar>\n <div class=\"wrapper\"> \n <div class=\"layout\">\n <div class=\"layout__left\">\n <div class=\"layout__leftContainer\">\n <header>\n <p class=\"font--xxlarge font--bold\" id=\"kc-page-title\"> Welcome Back!\n\n</p>\n </header>\n <div id=\"kc-content\">\n <div id=\"kc-content-wrapper\">\n\n <div id=\"kc-form\">\n <div id=\"kc-form-wrapper\">\n <form class=\"form\" id=\"kc-form-login\" onsubmit=\"login.disabled = true; return true;\" action=\"https://52.201.58.139/auth/realms/customer/login-actions/authenticate?session_code=OGhrwNfofiyT2_5pzlIFNgwJMThDroqwOXrAve5Zwps&execution=db8e970a-8488-45a8-b408-bf86fe6715c3&client_id=ie-management&tab_id=RQxftVRLkJU\" method=\"post\">\n <div class=\"inputgroup--vertical \">\n <div class=\"group group-start sc-ix-input-group sc-ix-input-group-s\">\n <span slot=\"input-start\" class=\"input-group-label\">Username or E-Mail</span>\n </div>\n\n <input tabindex=\"1\" id=\"username\" class=\"inputfield--text\" name=\"username\" value=\"\" type=\"text\" autofocus autocomplete=\"off\"\n aria-invalid=\"\"\n />\n\n \n </div>\n\n <div class=\"inputgroup--vertical \">\n <div class=\"group group-start sc-ix-input-group sc-ix-input-group-s\">\n <span slot=\"input-start\" class=\"input-group-label\">Password</span>\n </div>\n\n <input class=\"inputfield--text\" tabindex=\"2\" id=\"password\" name=\"password\" type=\"password\" autocomplete=\"off\"\n aria-invalid=\"\"\n />\n\n \n </div>\n\n <div>\n <div id=\"kc-form-options\">\n </div>\n </div>\n\n <div id=\"kc-form-buttons\">\n <input type=\"hidden\" id=\"id-hidden-input\" name=\"credentialId\" />\n <input class=\"button button--primary\" tabindex=\"4\" name=\"login\" id=\"kc-login\" type=\"submit\" value=\"Login\"/>\n </div>\n </form>\n </div>\n\n\n </div>\n\n\n\n\n\n </div>\n </div>\n </div>\n </div>\n\n <div class=\"layout__right\">\n </div>\n </div>\n </div>\n</body>\n</html>\n",
"body_murmur": -819861816,
"body_sha256": "78bf59b75542456b25d216f5768c865541f1b01d1ba8f2fcea98c37d7c4ddbd9",
"content_length": 3538,
"headers": {
"cache_control": [
"no-store, must-revalidate, max-age=0"
],
"connection": [
"keep-alive"
],
"content_language": [
"en"
],
"content_length": [
"3538"
],
"content_security_policy": [
"default-src 'self'; style-src 'self' 'unsafe-inline'; script-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' data:; font-src 'self' data:; frame-ancestors 'self';"
],
"content_type": [
"text/html;charset=utf-8"
],
"set_cookie": [
"AUTH_SESSION_ID=851a3eba-8041-45e6-ba5e-1cf31df1fb97; Version=1; Path=/auth/realms/customer/; SameSite=None; Secure; HttpOnly",
"AUTH_SESSION_ID_LEGACY=851a3eba-8041-45e6-ba5e-1cf31df1fb97; Version=1; Path=/auth/realms/customer/; Secure; HttpOnly",
"KC_RESTART=eyJhbGciOiJIUzI1NiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICJlNzY3M2MzMC1kY2IyLTRiN2QtOWZjZS01NzZjNjY1NTMwMDUifQ.eyJjaWQiOiJpZS1tYW5hZ2VtZW50IiwicHR5Ijoib3BlbmlkLWNvbm5lY3QiLCJydXJpIjoiaHR0cHM6Ly81Mi4yMDEuNTguMTM5L2NiIiwiYWN0IjoiQVVUSEVOVElDQVRFIiwibm90ZXMiOnsic2NvcGUiOiJvcGVuaWQiLCJpc3MiOiJodHRwczovLzUyLjIwMS41OC4xMzkvYXV0aC9yZWFsbXMvY3VzdG9tZXIiLCJyZXNwb25zZV90eXBlIjoiY29kZSIsInJlZGlyZWN0X3VyaSI6Imh0dHBzOi8vNTIuMjAxLjU4LjEzOS9jYiIsInN0YXRlIjoiYWEwNjk0MTk1OGRiMDQ1MTVkNmExYzQzZjE5NWRhMzQiLCJub25jZSI6IjMzN2E5MmE2MjM4NWY2ODBhY2Y1MjJmMDgzZGNiNmI2In19.WpeiP5p135q6ar3uTPTrhHEngPUVKtVBByO_3b-APbU; Version=1; Path=/auth/realms/customer/; Secure; HttpOnly"
],
"strict_transport_security": [
"max-age=63072000; includeSubDomains; preload"
],
"unknown": [
{
"key": "x_robots_tag",
"value": [
"none"
]
},
{
"key": "referrer_policy",
"value": [
"no-referrer"
]
}
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"0"
]
},
"protocol": "HTTP/1.1",
"redirects": [
{
"body": "<html>\r\n<head><title>302 Found</title></head>\r\n<body>\r\n<center><h1>302 Found</h1></center>\r\n</body>\r\n</html>\r\n",
"body_murmur": -9616316,
"body_sha256": "075f0fd7eeb4bfec31816d61be72b064d4899853b224bd5f380041d7dd0b1d19",
"content_length": 110,
"headers": {
"cache_control": [
"no-cache, no-store, max-age=0"
],
"connection": [
"keep-alive"
],
"content_length": [
"110"
],
"content_security_policy": [
"default-src 'self'; frame-ancestors 'self';"
],
"content_type": [
"text/html"
],
"date": [
"Sat, 28 Sep 2024 11:25:37 GMT"
],
"location": [
"https://52.201.58.139/auth/realms/customer/protocol/openid-connect/auth?client_id=ie-management&state=aa06941958db04515d6a1c43f195da34&scope=openid&redirect_uri=https%3A%2F%2F52.201.58.139%2Fcb&response_type=code&nonce=337a92a62385f680acf522f083dcb6b6"
],
"set_cookie": [
"session=BVcT3DOm1mjWyTluEq2qzw|1727526337|9rNcr9ew8vgFHVrlrqldPmOVpFOBNfOD4nujY7YQTh_m8YdnziL4sTjM2JuLFCYcVn9ROySI38RsHVT9qsGqcIFin--DvjA55uE0E1T0swYDTbXHCOSm_gVgHzXl1wS8_m4_bHr422n3ZrKg04Y5M1uTkrlecMGOvP3SdV0c3QliJql1sos00ph1tsr1kCEZ|Vx9WsrExp9hiR0pT1WBsJ34ZesE; Path=/; SameSite=Lax; Secure; HttpOnly"
],
"strict_transport_security": [
"max-age=63072000; includeSubDomains; preload"
],
"x_content_type_options": [
"nosniff"
],
"x_frame_options": [
"SAMEORIGIN"
],
"x_xss_protection": [
"0"
]
},
"location": "https://52.201.58.139/auth/realms/customer/protocol/openid-connect/auth?client_id=ie-management&state=aa06941958db04515d6a1c43f195da34&scope=openid&redirect_uri=https%3A%2F%2F52.201.58.139%2Fcb&response_type=code&nonce=337a92a62385f680acf522f083dcb6b6",
"protocol": "HTTP/1.1",
"status_code": 302,
"status_line": "302 Moved Temporarily"
}
],
"request": {
"headers": {
"accept": [
"*/*"
],
"referer": [
"https://52.201.58.139"
],
"user_agent": [
"Mozilla/5.0 (compatible; Odin; https://docs.getodin.com/)"
]
},
"method": "GET",
"url": {
"host": "52.201.58.139",
"path": "/auth/realms/customer/protocol/openid-connect/auth",
"raw_query": "client_id=ie-management&state=aa06941958db04515d6a1c43f195da34&scope=openid&redirect_uri=https%3A%2F%2F52.201.58.139%2Fcb&response_type=code&nonce=337a92a62385f680acf522f083dcb6b6",
"scheme": "https"
}
},
"status_code": 200,
"title": "Login to IEM"
},
"tls": {
"certificate": {
"extensions": {
"authority_key_id": "dirname/c=de/st=ga/l=dummy/cn=my personal root ca\nserial7e92b6e7e93ac870f642247c6ce4b435de745152",
"basic_constraints": {
"is_ca": true
},
"extended_key_usage": {
"any": false,
"apple_code_signing": false,
"apple_code_signing_development": false,
"apple_code_signing_third_party": false,
"apple_crypto_development_env": false,
"apple_crypto_env": false,
"apple_crypto_maintenance_env": false,
"apple_crypto_production_env": false,
"apple_crypto_qos": false,
"apple_crypto_test_env": false,
"apple_crypto_tier0_qos": false,
"apple_crypto_tier1_qos": false,
"apple_crypto_tier2_qos": false,
"apple_crypto_tier3_qos": false,
"apple_ichat_encryption": false,
"apple_ichat_signing": false,
"apple_resource_signing": false,
"apple_software_update_signing": false,
"apple_system_identity": false,
"client_auth": false,
"code_signing": false,
"dvcs": false,
"eap_over_lan": false,
"eap_over_ppp": false,
"email_protection": false,
"ipsec_end_system": false,
"ipsec_intermediate_system_usage": false,
"ipsec_tunnel": false,
"ipsec_user": false,
"microsoft_ca_exchange": false,
"microsoft_cert_trust_list_signing": false,
"microsoft_csp_signature": false,
"microsoft_document_signing": false,
"microsoft_drm": false,
"microsoft_drm_individualization": false,
"microsoft_efs_recovery": false,
"microsoft_embedded_nt_crypto": false,
"microsoft_encrypted_file_system": false,
"microsoft_enrollment_agent": false,
"microsoft_kernel_mode_code_signing": false,
"microsoft_key_recovery_21": false,
"microsoft_key_recovery_3": false,
"microsoft_license_server": false,
"microsoft_licenses": false,
"microsoft_lifetime_signing": false,
"microsoft_mobile_device_software": false,
"microsoft_nt5_crypto": false,
"microsoft_oem_whql_crypto": false,
"microsoft_qualified_subordinate": false,
"microsoft_root_list_signer": false,
"microsoft_server_gated_crypto": false,
"microsoft_sgc_serialized": false,
"microsoft_smart_display": false,
"microsoft_smartcard_logon": false,
"microsoft_system_health": false,
"microsoft_system_health_loophole": false,
"microsoft_timestamp_signing": false,
"microsoft_whql_crypto": false,
"netscape_server_gated_crypto": false,
"ocsp_signing": false,
"sbgp_cert_aa_service_auth": false,
"server_auth": true,
"time_stamping": false
},
"key_usage": {
"certificate_sign": false,
"content_commitment": false,
"crl_sign": false,
"data_encipherment": false,
"decipher_only": false,
"digital_signature": true,
"encipher_only": false,
"key_agreement": false,
"key_encipherment": true,
"non_repudiation": true
},
"ns_cert_type": {
"ssl_server": true
},
"ns_comment": "My Certificate",
"subject_alt_name": {
"ip_address": [
"52.201.58.139"
]
},
"subject_key_id": "da3b0013f76f844f17a6ff12f4557421fc38a88c"
},
"fingerprint_md5": "F0C19CAD03B73AA7C9F78B906199AD89",
"fingerprint_sha1": "8CB0F95AC107A5103A395E2CDCBA810C94BE069A",
"fingerprint_sha256": "5F17E0EF1B4B51BBA007EE394F1888D6749B074E8A8388C079C34158793D5793",
"issuer": {
"common_name": [
"My Personal Root CA"
],
"country": [
"DE"
],
"locality": [
"Dummy"
],
"province": [
"GA"
]
},
"issuer_dn": "/C=DE/ST=GA/L=Dummy/CN=My Personal Root CA",
"jarm": "15d3fd16d29d29d00042d43d00000071784fa9f8305ba9220d0a7894b6ff2c",
"redacted": false,
"revocation": {
"ocsp": {
"reason": "UNKNOWN",
"revoked": false
}
},
"serial_number": "324431946913579945919719688143647796532006101588",
"signature": {
"algorithm": {
"name": "SHA256-RSA",
"oid": "1.2.840.113549.1.1.11"
},
"self_signed": false,
"value": "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"
},
"subject": {
"common_name": [
"52.201.58.139"
],
"country": [
"DE"
],
"locality": [
"Dummy"
],
"organization": [
"Dummy"
],
"province": [
"Dummy"
]
},
"subject_alt_name": {
"dns_names": [
"52.201.58.139"
],
"extended_dns_names": []
},
"subject_dn": "/C=DE/ST=Dummy/L=Dummy/O=Dummy/CN=52.201.58.139",
"subject_key_info": {
"_key": "rsa",
"dh": [],
"dsa": [],
"ecdsa": [],
"fingerprint_sha256": "2852929aabdafafbd52457f068effb85b94060ed62a7ae476afdd00c486aa41e",
"key_algorithm": "RSA",
"rsa": {
"exponent": 65537,
"length": 4096,
"modulus": "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"
}
},
"tbs_fingerprint": "4699f625781599956d9ec52c0c30aa34e66fc7cb1a9ef4bc59742846fc9b0904",
"validation_level": "OV",
"validity": {
"length_seconds": 71280000,
"not_after": "2026-06-23T17:16:14",
"not_before": "2024-03-20T17:16:14"
},
"version": 2
},
"fingerprint_sha256": "5F17E0EF1B4B51BBA007EE394F1888D6749B074E8A8388C079C34158793D5793",
"precert": false,
"raw": "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",
"tags": [
"ov",
"trusted"
]
}
},
"url": "https://52.201.58.139/",
"_meta": {
"name": "",
"desc": "",
"category": ""
},
"last_updated_at": "2024-09-28T13:06:10.951Z"
}
],
"services_hash": "d853ee33c78d32d3412fc4fcf64948164b7e86cd64dc35a846e0b43a9ccaf763",
"last_updated_at": "2024-10-13T19:13:11.791Z",
"banner": [
"http",
"tls"
],
"is_vuln": true,
"cveDetails": {
"CVE-2006-20001": {
"id": "CVE-2006-20001",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.\n\nThis issue affects Apache HTTP Server 2.4.54 and earlier.\n",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-787"
},
"CVE-2022-22719": {
"id": "CVE-2022-22719",
"references": [
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-665"
},
"CVE-2022-22720": {
"id": "CVE-2022-22720",
"references": [
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/3",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2022-22721": {
"id": "CVE-2022-22721",
"references": [
"http://seclists.org/fulldisclosure/2022/May/33",
"http://seclists.org/fulldisclosure/2022/May/35",
"http://seclists.org/fulldisclosure/2022/May/38",
"http://www.openwall.com/lists/oss-security/2022/03/14/2",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://support.apple.com/kb/HT213255",
"https://support.apple.com/kb/HT213256",
"https://support.apple.com/kb/HT213257",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.oracle.com/security-alerts/cpujul2022.html"
],
"score": 9.1,
"services": [
"80/http"
],
"severity": "critical",
"summary": "If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"weakness": "CWE-190"
},
"CVE-2022-23943": {
"id": "CVE-2022-23943",
"references": [
"http://www.openwall.com/lists/oss-security/2022/03/14/1",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2022/03/msg00033.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/RGWILBORT67SHMSLYSQZG2NMXGCMPUZO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/X73C35MMMZGBVPQQCH7LQZUMYZNQA5FO/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z7H26WJ6TPKNWV3QKY4BHKUKQVUTZJTD/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220321-0001/",
"https://www.oracle.com/security-alerts/cpuapr2022.html",
"https://www.tenable.com/security/tns-2022-08",
"https://www.tenable.com/security/tns-2022-09"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-787"
},
"CVE-2022-26377": {
"id": "CVE-2022-26377",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/2",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
},
"CVE-2022-28330": {
"id": "CVE-2022-28330",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/3",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 5.3,
"services": [
"80/http"
],
"severity": "medium",
"summary": "Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-125"
},
"CVE-2022-28614": {
"id": "CVE-2022-28614",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 5.3,
"services": [
"80/http"
],
"severity": "medium",
"summary": "The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"weakness": "CWE-190"
},
"CVE-2022-28615": {
"id": "CVE-2022-28615",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/9",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 9.1,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"weakness": "CWE-190"
},
"CVE-2022-29404": {
"id": "CVE-2022-29404",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/5",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2022-30556": {
"id": "CVE-2022-30556",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/7",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "NVD-CWE-Other"
},
"CVE-2022-31813": {
"id": "CVE-2022-31813",
"references": [
"http://www.openwall.com/lists/oss-security/2022/06/08/8",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/",
"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/",
"https://security.gentoo.org/glsa/202208-20",
"https://security.netapp.com/advisory/ntap-20220624-0005/"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-345"
},
"CVE-2022-36760": {
"id": "CVE-2022-36760",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2022-37436": {
"id": "CVE-2022-37436",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 5.3,
"services": [
"80/http"
],
"severity": "medium",
"summary": "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"weakness": "CWE-113"
},
"CVE-2023-25690": {
"id": "CVE-2023-25690",
"references": [
"http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example, something like:\n\n\n\n\nRewriteEngine on\nRewriteRule \"^/here/(.*)\" \"http://example.com:8080/elsewhere?$1\"; [P]\nProxyPassReverse /here/ http://example.com:8080/\n\n\nRequest splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.\n\n\n",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-444"
},
"CVE-2023-27522": {
"id": "CVE-2023-27522",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html",
"https://security.gentoo.org/glsa/202309-01"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.\n\nSpecial characters in the origin response header can truncate/split the response forwarded to the client.\n\n\n",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"weakness": "CWE-444"
},
"CVE-2023-31122": {
"id": "CVE-2023-31122",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/TI3V2YCEUM65QDYPGGNUZ7UONIM5OEXC/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/VZJTT5TEFNSBWVMKCLS6EZ7PI6EJYBCO/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/ZFDNHDH4VLFGDPY6MEZV2RO5N5FLFONW/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.\n\n",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-125"
},
"CVE-2023-45802": {
"id": "CVE-2023-45802",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/2MBEPPC36UBVOZZNAXFHKLFGSLCMN5LI/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/BFQD3KUEMFBHPAPBGLWQC34L4OWL5HAZ/",
"https://lists.fedoraproject.org/archives/list/[email protected]/message/WE2I52RHNNU42PX6NZ2RBUHSFFJ2LVZX/",
"https://security.netapp.com/advisory/ntap-20231027-0011/"
],
"score": 5.9,
"services": [
"80/http"
],
"severity": "medium",
"summary": "When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that.\n\nThis was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During \"normal\" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out.\n\nUsers are recommended to upgrade to version 2.4.58, which fixes the issue.\n",
"vector_string": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-27316": {
"id": "CVE-2024-27316",
"references": [
"http://seclists.org/fulldisclosure/2024/Jul/18",
"http://www.openwall.com/lists/oss-security/2024/04/04/4",
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://support.apple.com/kb/HT214119",
"https://www.openwall.com/lists/oss-security/2024/04/03/16"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-770"
},
"CVE-2024-38474": {
"id": "CVE-2024-38474",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in\ndirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.\n\nSome RewriteRules that capture and substitute unsafely will now fail unless rewrite flag \"UnsafeAllow3F\" is specified.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "CWE-116"
},
"CVE-2024-38476": {
"id": "CVE-2024-38476",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 9.8,
"services": [
"80/http"
],
"severity": "critical",
"summary": "Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"weakness": "NVD-CWE-noinfo"
},
"CVE-2024-38477": {
"id": "CVE-2024-38477",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html",
"https://security.netapp.com/advisory/ntap-20240712-0001/"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request.\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"weakness": "CWE-476"
},
"CVE-2024-40898": {
"id": "CVE-2024-40898",
"references": [
"https://httpd.apache.org/security/vulnerabilities_24.html"
],
"score": 7.5,
"services": [
"80/http"
],
"severity": "high",
"summary": "SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.\n\nUsers are recommended to upgrade to version 2.4.62 which fixes this issue. ",
"vector_string": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"weakness": "CWE-918"
}
}
}