We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-10306

Mod_proxy_cluster: mod_proxy_cluster unauthorized mcmp requests



Description

A vulnerability was found in mod_proxy_cluster. The issue is that the <Directory> directive should be replaced by the <Location> directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.

Reserved 2024-10-23 | Published 2025-04-23 | Updated 2025-05-14 | Assigner redhat


MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

Incorrect Authorization

Product status

Default status
unaffected

1.3.17 before 1.3.21.Final
affected

Default status
affected

0:1.3.21-1.el10 before *
unaffected

Default status
affected

Default status
affected

Default status
affected

Timeline

2024-10-23:Reported to Red Hat.
2025-02-28:Made public.

References

access.redhat.com/errata/RHBA-2025:5309 (RHBA-2025:5309) vendor-advisory

access.redhat.com/security/cve/CVE-2024-10306 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2321302 (RHBZ#2321302) issue-tracking

cve.org (CVE-2024-10306)

nvd.nist.gov (CVE-2024-10306)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-10306

Support options

Helpdesk Chat, Email, Knowledgebase