regex update
parent
ae6b2b42bf
commit
fa73765221
|
@ -1,10 +1,10 @@
|
|||
id: CVE-2020-9490
|
||||
|
||||
info:
|
||||
name: CVE-2020-9490 Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
|
||||
author: philippedelteil
|
||||
name: CVE-2020-9490
|
||||
severity: medium
|
||||
description: Detects apache versions 2.4.43, 2.4.39, 2.4.38, 2.4.37, 2.4.35, 2.4.34, 2.4.33, 2.4.30, 2.4.29, 2.4.28, 2.4.27, 2.4.26, 2.4.25, 2.4.23, 2.4.20 that are POTENTIALLY vulnerable to CVE-2020-9490
|
||||
description: Apache HTTP Server versions 2.4.20 to 2.4.43. A specially crafted value for the 'Cache-Digest' header in a HTTP/2 request would result in a crash when the server actually tries to HTTP/2 PUSH a resource afterwards. Configuring the HTTP/2 feature via "H2Push off" will mitigate this vulnerability for unpatched servers.
|
||||
author: philippedelteil
|
||||
tags: cve,cve2020,apache,dos
|
||||
reference: |
|
||||
- https://httpd.apache.org/security/vulnerabilities_24.html
|
||||
|
@ -20,5 +20,5 @@ requests:
|
|||
matchers:
|
||||
- type: regex
|
||||
regex:
|
||||
- "Apache/2\.4\.(2[0356789]|3[0345789]|43)$"
|
||||
part: header
|
||||
- "Apache/2\\.4\\.([3-3][0-9]|2[0-9]|4[0-3])"
|
||||
part: body
|
||||
|
|
Loading…
Reference in New Issue