Improper Access Control Affecting httpd package, versions <0:2.2.15-60.el6_9.6


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.18% (56th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS6-HTTPD-2144104
  • published26 Jul 2021
  • disclosed19 Oct 2017

Introduced: 19 Oct 2017

CVE-2017-12171  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade Centos:6 httpd to version 0:2.2.15-60.el6_9.6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream httpd package and not the httpd package as distributed by Centos. See How to fix? for Centos:6 relevant fixed versions and status.

A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.