Forum Moderators: phranque
[apache.org...]
This is a really nasty exploit.
An important upgrade if you run your own servers. If you're on shared or managed hosting, you can check with your hosting company.
[apache.org...]
This flaw does not affect a default installation of Apache HTTP Server. Users who do not use, or have not enabled, the Rewrite module mod_rewrite are not affected by this issue. This issue only affects installations using a Rewrite rule with the following characteristics:* The RewriteRule allows the attacker to control the initial part of the rewritten URL (for example if the substitution URL starts with $1)
* The RewriteRule flags do NOT include any of the following flags: Forbidden (F), Gone (G), or NoEscape (NE).
My read on this is that this is an AND condition and not an or.
You should probably do the upgrade, but if you can't for technical reasons, then at least disable all the rules that start with a $1 and do not include the above flags..
You should probably do the upgrade, but if you can't for technical reasons, then at least disable all the rules that start with a $1 and do not include the above flags..
I don't know mod_rewrite enough to understand what rules are safe and what ones aren't. With mod_rewrite syntax...
RewriteRule Pattern Substitution [Flag(s)]
...may I assume that $1 can appear anywhere in the rule as long as you don't put it at the very start of the Substitution section?
If so, all my sites are safe as I've never used a rewrite rule in that way in my life and can't even think of an instance where it would be helpful.
[edited by: MatthewHSE at 3:38 pm (utc) on July 31, 2006]
Unfortunately, it will not be possible to upgrade the server or have access to the update settings. You will have mod_rewrite privledges for your account. I apologize for the confusion.
uhm, okay.
i don't see why it isn't possible to upgrade.. for such a big-name company, this makes absolutely no sense.