{"id":1997,"date":"2020-04-07T13:00:03","date_gmt":"2020-04-07T18:00:03","guid":{"rendered":"https:\/\/cert.pa\/?p=1997"},"modified":"2020-04-07T13:00:03","modified_gmt":"2020-04-07T18:00:03","slug":"csirt-panama-aviso-2020-04-06-apache-vulnerabilidades-de-apache-http-server-2-4","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=1997","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2020-04-06 Apache: Vulnerabilidades de Apache HTTP Server 2.4"},"content":{"rendered":"\n<p>Gravedad: Alta                                                                                                           Vulnerabilidad: CVE-2020-1927  \/ CVE-2020-1934                                                                                     <br> Fecha de publicaci\u00f3n: Marzo 6, 2020<br> \u00daltima revisi\u00f3n: Marzo 6, 2020<br> Portal: <a href=\"https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html\">https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html<\/a><\/p>\n\n\n\n<p><strong>Sistemas Afectados:<\/strong><br> Servidor HTTP Apache desde la versi\u00f3n 2.4.0 hasta la 2.4.41.<br> I. Descripci\u00f3n<br> Actualizaci\u00f3n de Apache HTTP Server 2.4  referente a dos vulnerabilidades cr\u00edticas que afectan a sus productos, versiones corregidas mediante la versi\u00f3n 2.4.42.<\/p>\n\n\n\n<p><strong>II. Impacto<\/strong><br>Vulnerabilidad: CVE-2020-1927<br>Debido a una incorrecta sanitizaci\u00f3n de datos entregados por el usuario en algunas configuraciones \u201cmod_rewrite\u201d, un atacante remoto podr\u00eda crear un enlace que lleve a un sitio seguro, pero que al darle click, redirija a otro sitio web. Esto podr\u00eda permitir a un atacante enga\u00f1ar a usuarios que den click en el enlace permiti\u00e9ndole realizar ataques phishing para robar credenciales e informaci\u00f3n sensible.<\/p>\n\n\n\n<p>Vulnerabilidad: CVE-2020-1934<br> Debido a que era posible para un servidor FTP malicioso abusar del componente \u201cmod_proxy_ftp\u201d que utilizaba memoria sin inicializar al pasar por el proxy, un atacante remoto pod\u00eda obtener acceso no autorizado a informaci\u00f3n sensible del sistema afectado.<\/p>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e informaci\u00f3n<\/strong><\/p>\n\n\n\n<p>Mitigaci\u00f3n: Actualizar a la versi\u00f3n 2.4.42.<br><strong> Fuentes: <\/strong><br> \u2022    Mozilla.org. 3 de abril del 2020. Recopilado en: <a href=\"https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html\">https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html<\/a><br> \u2022    Common Vulnerabilities and Exposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-1927\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-1927<\/a><br> \u2022    Common Vulnerabilities and Exposures (CVE). Recopilado en: <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-1934\">https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2020-1934<\/a><br> \u2022    CSIRT Chile. Vulnerabilidades. 4 de abril del 2020. Recopilado en: <a href=\"https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00168-01\/\">https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa20-00168-01\/<\/a><\/p>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br> CSIRT PANAMA<br> Computer Security Incident Response Team Autoridad Nacional para la Innovacion Gubernamental<br> E-Mail: info@cert.pa<br> Phone: +507 520-CERT (2378)<br> Web: <a href=\"https:\/\/cert.pa\">https:\/\/cert.pa<\/a><br> Twitter: @CSIRTPanama<br> Facebook: <a href=\"http:\/\/www.facebook.com\/CSIRTPanama\">http:\/\/www.facebook.com\/CSIRTPanama<\/a><br> Key ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Gravedad: Alta Vulnerabilidad: CVE-2020-1927 \/ CVE-2020-1934 Fecha de publicaci\u00f3n: Marzo 6, 2020 \u00daltima revisi\u00f3n: Marzo 6, 2020 Portal: https:\/\/httpd.apache.org\/security\/vulnerabilities_24.html Sistemas Afectados: Servidor HTTP Apache desde la versi\u00f3n 2.4.0 hasta la 2.4.41. I. Descripci\u00f3n Actualizaci\u00f3n de&#8230;<\/p>\n","protected":false},"author":3,"featured_media":1428,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-1997","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1997","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1997"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1997\/revisions"}],"predecessor-version":[{"id":1998,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/1997\/revisions\/1998"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/1428"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1997"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1997"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1997"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}