CVE-2013-5704 (CNNVD-201404-199)
MEDIUM
中文标题:
Apache HTTP Server mod_headers模块权限许可和访问控制问题漏洞
英文标题:
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHe...
CVSS分数:
5.0
发布时间:
2014-04-15 10:00:00
漏洞类型:
权限许可和访问控制问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Apache HTTP Server是美国阿帕奇(Apache)软件基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.2.22版本的mod_headers模块存在安全漏洞。远程攻击者可利用该漏洞绕过‘RequestHeader unset’指令。
英文描述:
The mod_headers module in the Apache HTTP Server 2.2.22 allows remote attackers to bypass "RequestHeader unset" directives by placing a header in the trailer portion of data sent with chunked transfer coding. NOTE: the vendor states "this is not a security issue in httpd as such."
CWE类型:
(暂无数据)
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| apache | http_server | 2.2.0 | - | - |
cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.2 | - | - |
cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.3 | - | - |
cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.4 | - | - |
cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.5 | - | - |
cpe:2.3:a:apache:http_server:2.2.5:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.6 | - | - |
cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.8 | - | - |
cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.9 | - | - |
cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.10 | - | - |
cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.11 | - | - |
cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.12 | - | - |
cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.13 | - | - |
cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.14 | - | - |
cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.15 | - | - |
cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.16 | - | - |
cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.17 | - | - |
cpe:2.3:a:apache:http_server:2.2.17:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.18 | - | - |
cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.19 | - | - |
cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.20 | - | - |
cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.21 | - | - |
cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.22 | - | - |
cpe:2.3:a:apache:http_server:2.2.22:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.23 | - | - |
cpe:2.3:a:apache:http_server:2.2.23:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.24 | - | - |
cpe:2.3:a:apache:http_server:2.2.24:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.25 | - | - |
cpe:2.3:a:apache:http_server:2.2.25:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.26 | - | - |
cpe:2.3:a:apache:http_server:2.2.26:*:*:*:*:*:*:*
|
| apache | http_server | 2.2.27 | - | - |
cpe:2.3:a:apache:http_server:2.2.27:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.1 | - | - |
cpe:2.3:a:apache:http_server:2.4.1:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.2 | - | - |
cpe:2.3:a:apache:http_server:2.4.2:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.3 | - | - |
cpe:2.3:a:apache:http_server:2.4.3:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.4 | - | - |
cpe:2.3:a:apache:http_server:2.4.4:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.6 | - | - |
cpe:2.3:a:apache:http_server:2.4.6:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.7 | - | - |
cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.9 | - | - |
cpe:2.3:a:apache:http_server:2.4.9:*:*:*:*:*:*:*
|
| apache | http_server | 2.4.10 | - | - |
cpe:2.3:a:apache:http_server:2.4.10:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.3 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 6.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_web_server | 3.0.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_web_server | 2.0.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_web_server:2.0.0:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | * | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:*:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | 12.1.4 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.1.4:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | 12.2.0 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.0:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | 12.2.1 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.2.1:*:*:*:*:*:*:*
|
| oracle | enterprise_manager_ops_center | 12.3.0 | - | - |
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.3.0:*:*:*:*:*:*:*
|
| oracle | http_server | 10.1.3.5.0 | - | - |
cpe:2.3:a:oracle:http_server:10.1.3.5.0:*:*:*:*:*:*:*
|
| oracle | http_server | 11.1.1.7.0 | - | - |
cpe:2.3:a:oracle:http_server:11.1.1.7.0:*:*:*:*:*:*:*
|
| oracle | http_server | 12.1.2.0 | - | - |
cpe:2.3:a:oracle:http_server:12.1.2.0:*:*:*:*:*:*:*
|
| oracle | http_server | 12.1.3.0 | - | - |
cpe:2.3:a:oracle:http_server:12.1.3.0:*:*:*:*:*:*:*
|
| oracle | linux | 6 | - | - |
cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*
|
| oracle | solaris | 11.2 | - | - |
cpe:2.3:o:oracle:solaris:11.2:*:*:*:*:*:*:*
|
| apple | mac_os_x | * | - | - |
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
|
| apple | mac_os_x_server | * | - | - |
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 10.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 12.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
|
| canonical | ubuntu_linux | 14.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
|
| canonical | ubuntu_linux | 14.10 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:14.10:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
HPSBUX03512
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
GLSA-201504-03
vendor-advisory
cve.org
访问
cve.org
RHSA-2015:1249
vendor-advisory
cve.org
访问
cve.org
RHSA-2016:0061
vendor-advisory
cve.org
访问
cve.org
RHSA-2015:0325
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
MDVSA-2014:174
vendor-advisory
cve.org
访问
cve.org
USN-2523-1
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2016:0062
vendor-advisory
cve.org
访问
cve.org
SSRT102066
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2015:2661
vendor-advisory
cve.org
访问
cve.org
APPLE-SA-2015-04-08-2
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2015:2659
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
RHSA-2015:2660
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
APPLE-SA-2015-09-16-4
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
66550
vdb-entry
cve.org
访问
cve.org
[dev] 20140401 CVE-2013-5704, mod_headers and chunked trailer fields
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20190815 svn commit: r1048743 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20190815 svn commit: r1048742 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20190815 svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20190815 svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20200401 svn commit: r1058586 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20200401 svn commit: r1058586 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20200401 svn commit: r1058587 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20200401 svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073139 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073139 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073140 [4/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1888194 [9/13] - /httpd/site/trunk/content/security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073149 [9/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210330 svn commit: r1073146 [3/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
[httpd-cvs] 20210606 svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html security/vulnerabilities_24.html
mailing-list
cve.org
访问
cve.org
CVSS评分详情
5.0
MEDIUM
CVSS向量:
AV:N/AC:L/Au:N/C:N/I:P/A:N
CVSS版本:
2.0
机密性
NONE
完整性
PARTIAL
可用性
NONE
时间信息
发布时间:
2014-04-15 10:00:00
修改时间:
2024-08-06 17:22:30
创建时间:
2025-11-11 15:33:39
更新时间:
2025-11-11 15:51:20
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2013-5704 |
2025-11-11 15:18:39 | 2025-11-11 07:33:39 |
| NVD | nvd_CVE-2013-5704 |
2025-11-11 14:54:17 | 2025-11-11 07:42:25 |
| CNNVD | cnnvd_CNNVD-201404-199 |
2025-11-11 15:09:26 | 2025-11-11 07:51:20 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:51:20
vulnerability_type: 未提取 → 权限许可和访问控制问题; cnnvd_id: 未提取 → CNNVD-201404-199; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 权限许可和访问控制问题
- cnnvd_id: 未提取 -> CNNVD-201404-199
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:42:25
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:N/I:P/A:N; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 71; references_count: 49 → 47; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:P/A:N
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 71
- references_count: 49 -> 47
- data_sources: ['cve'] -> ['cve', 'nvd']