Vulnerability Details : CVE-2011-3368
Public exploit exists!
The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial @ (at sign) character.
Vulnerability category: Input validation
Products affected by CVE-2011-3368
- cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.17:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.19:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.18:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.28:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.22:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.20:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.25:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.24:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.26:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.23:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.27:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.28:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.32:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.35:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.36:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.39:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.37:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.38:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.42:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.40:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.41:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.15:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.43:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.44:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.45:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.28:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.46:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.47:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.48:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.29:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.31:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.49:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.50:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.51:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.52:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.32:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.33:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.53:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.30:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.54:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.55:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.56:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.57:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.58:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.59:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.61:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.32:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.34:beta:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.60:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.37:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.34:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.36:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.38:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.42:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.8:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.9:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.68:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.12:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.13:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.35:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.41:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.65:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.63:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:1.3.39:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.10:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.11:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.14:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.15:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.18:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.0.64:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.19:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.16:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.21:*:*:*:*:*:*:*
- cpe:2.3:a:apache:http_server:2.2.20:*:*:*:*:*:*:*
Threat overview for CVE-2011-3368
Top countries where our scanners detected CVE-2011-3368
Top open port discovered on systems with this issue
80
IPs affected by CVE-2011-3368 899,400
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2011-3368!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2011-3368
97.02%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2011-3368
-
Apache Reverse Proxy Bypass Vulnerability Scanner
First seen: 2020-04-26auxiliary/scanner/http/rewrite_proxy_bypassScan for poorly configured reverse proxy servers. By default, this module attempts to force the server to make a request with an invalid domain name. Then, if the bypass is successful, the server will look it up and of course fail, then responding with a stat
CVSS scores for CVE-2011-3368
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2011-3368
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-3368
-
https://lists.apache.org/thread.html/r75cbe9ea3e2114e4271bbeca7aff96117b50c1b6eb7c4772b0337c1f@%3Ccvs.httpd.apache.org%3E
svn commit: r1075470 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2020-13938.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_2
-
https://lists.apache.org/thread.html/r9ea3538f229874c80a10af473856a81fbf5f694cd7f471cc679ba70b@%3Ccvs.httpd.apache.org%3E
svn commit: r1073140 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html s
-
http://lists.apple.com/archives/security-announce/2012/Sep/msg00004.html
Apple - Lists.apple.com
-
http://rhn.redhat.com/errata/RHSA-2012-0542.html
RHSA-2012:0542 - Security Advisory - Red Hat Customer Portal
-
https://lists.apache.org/thread.html/r688df6f16f141e966a0a47f817e559312b3da27886f59116a94b273d@%3Ccvs.httpd.apache.org%3E
svn commit: r1888194 [7/13] - /httpd/site/trunk/content/security/json/ - Pony Mail
-
http://www-01.ibm.com/support/docview.wss?uid=nas2b7c57b1f1035675186257927003c8d48
IBM notice: The page you requested cannot be displayed
-
https://lists.apache.org/thread.html/f7f95ac1cd9895db2714fa3ebaa0b94d0c6df360f742a40951384a53@%3Ccvs.httpd.apache.org%3E
svn commit: r1048742 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
https://lists.apache.org/thread.html/rdca61ae990660bacb682295f2a09d34612b7bb5f457577fe17f4d064@%3Ccvs.httpd.apache.org%3E
svn commit: r1073146 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities-httpd.xml security/vulnerabilities_22.html security/vulnerabilities_24.html
-
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142@%3Ccvs.httpd.apache.org%3E
svn commit: r1073143 [2/3] - in /websites/staging/httpd/trunk/content: ./ security/ - Pony Mail
-
https://lists.apache.org/thread.html/r1d201e3da31a2c8aa870c8314623caef7debd74a13d0f25205e26f15@%3Ccvs.httpd.apache.org%3E
svn commit: r1073149 [8/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ - Pony Mail
-
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b@%3Ccvs.httpd.apache.org%3E
svn commit: r1073140 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html s
-
http://www.contextis.com/research/blog/reverseproxybypass/
Page Not Found | Context Information Security UK
-
http://web.archiveorange.com/archive/v/ZyS0hzECD5zzb2NkvQlt
Product Reviews - Watch and Diamond Reviews Here!Exploit;Patch
-
http://www.redhat.com/support/errata/RHSA-2011-1392.html
Support
-
http://www.securityfocus.com/bid/49957
Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
-
http://www.debian.org/security/2012/dsa-2405
Debian -- Security Information -- DSA-2405-1 apache2
-
http://kb.juniper.net/JSA10585
Juniper Networks - 2013-08 Security Bulletin: Junos Space: Multiple Vulnerabilities
-
http://www.oracle.com/technetwork/topics/security/cpujul2012-392727.html
Oracle Critical Patch Update - July 2012
-
https://bugzilla.redhat.com/show_bug.cgi?id=740045
740045 – (CVE-2011-3368) CVE-2011-3368 httpd: reverse web proxy vulnerabilityExploit;Patch
-
http://seclists.org/fulldisclosure/2011/Oct/273
Full Disclosure: Context IS Advisory - Apache Reverse Proxy Bypass Vulnerability
-
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920@%3Ccvs.httpd.apache.org%3E
svn commit: r1073149 [1/13] - in /websites/staging/httpd/trunk/content: ./ security/ security/json/ - Pony Mail
-
http://www.securitytracker.com/id?1026144
Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers - SecurityTracker
-
http://www.mandriva.com/security/advisories?name=MDVSA-2013:150
mandriva.com
-
http://lists.opensuse.org/opensuse-updates/2013-02/msg00009.html
openSUSE-SU-2013:0243-1: moderate: update for apache2
-
http://www.mandriva.com/security/advisories?name=MDVSA-2011:144
mandriva.com
-
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79@%3Ccvs.httpd.apache.org%3E
svn commit: r1048743 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
http://www.redhat.com/support/errata/RHSA-2011-1391.html
Support
-
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
Oracle Critical Patch Update - January 2015
-
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9@%3Ccvs.httpd.apache.org%3E
Pony Mail!
-
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb@%3Ccvs.httpd.apache.org%3E
svn commit: r1058587 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10@%3Ccvs.httpd.apache.org%3E
svn commit: r1075467 [1/2] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_2
-
http://marc.info/?l=bugtraq&m=133294460209056&w=2
'[security bulletin] HPSBMU02748 SSRT100772 rev.1 - HP OpenView Network Node Manager (OV NNM) Running' - MARC
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/70336
Apache HTTP Server mod_proxy information disclosure CVE-2011-3368 Vulnerability Report
-
http://www-01.ibm.com/support/docview.wss?uid=nas2064c7e5f53452ff686257927003c8d42
IBM notice: The page you requested cannot be displayed
-
https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5@%3Ccvs.httpd.apache.org%3E
svn commit: r1073140 [1/4] - in /websites/staging/httpd/trunk/content: ./ security/cvejsontohtml.py security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_22.html s
-
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac@%3Ccvs.httpd.apache.org%3E
svn commit: r1048742 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
http://marc.info/?l=bugtraq&m=134987041210674&w=2
'[security bulletin] HPSBOV02822 SSRT100966 rev.1 - HP Secure Web Server (SWS) for OpenVMS, Remote De' - MARC
-
https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4@%3Ccvs.httpd.apache.org%3E
svn commit: r1075360 [1/3] - in /websites/staging/httpd/trunk/content: ./ security/json/CVE-2021-31618.json security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_2
-
https://lists.apache.org/thread.html/r57608dc51b79102f3952ae06f54d5277b649c86d6533dcd6a7d201f7@%3Ccvs.httpd.apache.org%3E
Pony Mail!
-
https://lists.apache.org/thread.html/re2e23465bbdb17ffe109d21b4f192e6b58221cd7aa8797d530b4cd75@%3Ccvs.httpd.apache.org%3E
svn commit: r1073139 [7/13] - in /websites/staging/httpd/trunk/content: ./ security/json/ - Pony Mail
-
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc@%3Ccvs.httpd.apache.org%3E
svn commit: r1058586 [2/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
http://svn.apache.org/viewvc?view=revision&revision=1179239
[Apache-SVN] Revision 1179239Patch
-
http://support.apple.com/kb/HT5501
About the security content of OS X Mountain Lion v10.8.2, OS X Lion v10.7.5 and Security Update 2012-004 - Apple Support
-
https://lists.apache.org/thread.html/r064df0985779b7ee044d3120d71ba59750427cf53f57ba3384e3773f@%3Ccvs.httpd.apache.org%3E
svn commit: r1888222 - in /httpd/site/trunk/content/security/json: CVE-2010-2068.json CVE-2010-2791.json CVE-2011-0419.json CVE-2011-3368.json - Pony Mail
-
http://lists.opensuse.org/opensuse-updates/2013-02/msg00012.html
openSUSE-SU-2013:0248-1: moderate: update for apache2
-
http://www.exploit-db.com/exploits/17969
Apache mod_proxy - Reverse Proxy Exposure - Multiple remote Exploit
-
http://rhn.redhat.com/errata/RHSA-2012-0543.html
RHSA-2012:0543 - Security Advisory - Red Hat Customer Portal
-
http://seclists.org/fulldisclosure/2011/Oct/232
Full Disclosure: Apache HTTP Server: mod_proxy reverse proxy exposure (CVE-2011-3368)
-
http://lists.opensuse.org/opensuse-security-announce/2011-11/msg00011.html
[security-announce] SUSE-SU-2011:1229-1: important: Security update for
-
https://lists.apache.org/thread.html/8d63cb8e9100f28a99429b4328e4e7cebce861d5772ac9863ba2ae6f@%3Ccvs.httpd.apache.org%3E
svn commit: r1048743 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
-
https://lists.apache.org/thread.html/rfbaf647d52c1cb843e726a0933f156366a806cead84fbd430951591b@%3Ccvs.httpd.apache.org%3E
svn commit: r1058587 [3/4] - in /websites/staging/httpd/trunk/content: ./ security/vulnerabilities-httpd.xml security/vulnerabilities_13.html security/vulnerabilities_20.html security/vulnerabilities_
Jump to