CVE-2022-28615
📋 TL;DR
This vulnerability in Apache HTTP Server 2.4.53 and earlier could cause crashes or information disclosure due to a buffer overflow in the ap_strcmp_match() function. Only systems using third-party modules or Lua scripts that call ap_strcmp_match() with extremely large inputs are affected. The core Apache distribution cannot trigger this vulnerability.
💻 Affected Systems
- Apache HTTP Server
📦 What is this software?
Fedora by Fedoraproject
Fedora by Fedoraproject
⚠️ Risk & Real-World Impact
Worst Case
Server crash leading to denial of service or memory disclosure revealing sensitive information
Likely Case
Server crash causing temporary service disruption
If Mitigated
No impact if no third-party modules use ap_strcmp_match() with large inputs
🎯 Exploit Status
Exploitation requires specific third-party module configurations and large input buffers
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Apache HTTP Server 2.4.54
Vendor Advisory: https://httpd.apache.org/security/vulnerabilities_24.html
Restart Required: Yes
Instructions:
1. Download Apache 2.4.54 or later from httpd.apache.org 2. Stop Apache service 3. Install/upgrade to patched version 4. Restart Apache service
🔧 Temporary Workarounds
Disable vulnerable third-party modules
allIdentify and disable any third-party modules that use ap_strcmp_match() function
# Check loaded modules: apachectl -M
# Disable modules in httpd.conf: LoadModule <module_name> off
🧯 If You Can't Patch
- Review and restrict third-party module usage to only essential functions
- Implement WAF rules to block extremely large input buffers to ap_strcmp_match() calls
🔍 How to Verify
Check if Vulnerable:
Check Apache version with 'httpd -v' or 'apache2 -v' and verify if it's 2.4.53 or earlier
Check Version:
httpd -v 2>/dev/null || apache2 -v 2>/dev/null || apachectl -v 2>/dev/null
Verify Fix Applied:
Confirm version is 2.4.54 or later using 'httpd -v' and test server functionality
📡 Detection & Monitoring
Log Indicators:
- Segmentation fault errors in Apache logs
- Unexpected Apache process crashes
- Error logs mentioning ap_strcmp_match
Network Indicators:
- Sudden HTTP service unavailability
- Connection resets to Apache server
SIEM Query:
source="apache_logs" AND ("segmentation fault" OR "core dumped" OR "ap_strcmp_match")
🔗 References
- http://www.openwall.com/lists/oss-security/2022/06/08/9
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/
- https://security.gentoo.org/glsa/202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- http://www.openwall.com/lists/oss-security/2022/06/08/9
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7QUGG2QZWHTITMABFLVXA4DNYUOTPWYQ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPY2BLEVJWFH34AX77ZJPLD2OOBYR6ND/
- https://security.gentoo.org/glsa/202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/