Improper Access Control Affecting mod_ssl package, versions <1:2.2.15-60.el6_9.6


Severity

Recommended
0.0
medium
0
10

Based on CentOS security rating.

Threat Intelligence

EPSS
0.18% (57th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-CENTOS6-MODSSL-2144567
  • published26 Jul 2021
  • disclosed19 Oct 2017

Introduced: 19 Oct 2017

CVE-2017-12171  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade Centos:6 mod_ssl to version 1:2.2.15-60.el6_9.6 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream mod_ssl package and not the mod_ssl package as distributed by Centos. See How to fix? for Centos:6 relevant fixed versions and status.

A regression was found in the Red Hat Enterprise Linux 6.9 version of httpd 2.2.15-60, causing comments in the "Allow" and "Deny" configuration lines to be parsed incorrectly. A web administrator could unintentionally allow any client to access a restricted HTTP resource.