A vulnerability was found in mod_proxy_cluster. The issue is that the <Directory> directive should be replaced by the <Location> directive as the former does not restrict IP/host access as `Require ip IP_ADDRESS` would suggest. This means that anyone with access to the host might send MCMP requests that may result in adding/removing/updating nodes for the balancing. However, this host should not be accessible to the public network as it does not serve the general traffic.
Workaround:
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://access.redhat.com/errata/RHBA-2025:2973 | vendor advisory |
https://access.redhat.com/errata/RHBA-2025:5309 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9434 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9466 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:9997 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2024-10306 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2321302 | issue tracking |