Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Vulnerability Details CVE-2020-1927
In Apache HTTP Server 2.4.0 to 2.4.41, redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
Exploit prediction scoring system (EPSS) score
EPSS Score
0.044
EPSS Ranking
88.4%
CVSS Severity
CVSS v3 Score
6.1
CVSS v2 Score
5.8
References
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
http://www.openwall.com/lists/oss-security/2020/04/03/1
http://www.openwall.com/lists/oss-security/2020/04/04/1
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/
https://security.netapp.com/advisory/ntap-20200413-0002/
https://usn.ubuntu.com/4458-1/
https://www.debian.org/security/2020/dsa-4757
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00002.html
http://www.openwall.com/lists/oss-security/2020/04/03/1
http://www.openwall.com/lists/oss-security/2020/04/04/1
https://httpd.apache.org/security/vulnerabilities_24.html
https://lists.apache.org/thread.html/r06f0d87ebb6d59ed8379633f36f72f5b1f79cadfda72ede0830b42cf%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r09bb998baee74a2c316446bd1a41ae7f8d7049d09d9ff991471e8775%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r10b853ea87dd150b0e76fda3f8254dfdb23dd05fa55596405b58478e%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r1719675306dfbeaceff3dc63ccad3de2d5615919ca3c13276948b9ac%40%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r3c5c3104813c1c5508b55564b66546933079250a46ce50eee90b2e36%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r52a52fd60a258f5999a8fa5424b30d9fd795885f9ff4828d889cd201%40%3Cdev.httpd.apache.org%3E
https://lists.apache.org/thread.html/r6a4146bf3d1645af2880f8b7a4fd8afd696d5fd4a3ae272f49f5dc84%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r70ba652b79ba224b2cbc0a183078b3a49df783b419903e3dcf4d78c7%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r731d43caece41d78d8c6304641a02a369fd78300e7ffaf566b06bc59%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r76142b8c5119df2178be7c2dba88fde552eedeec37ea993dfce68d1d%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rc998b18880df98bafaade071346690c2bc1444adaa1a1ea464b93f0a%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rdf3e5d0a5f5c3d90d6013bccc6c4d5af59cf1f8c8dea5d9a283d13ce%40%3Ccvs.httpd.apache.org%3E
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E
https://lists.debian.org/debian-lts-announce/2021/07/msg00006.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/A2RN46PRBJE7E7OPD4YZX5SVWV5QKGV5/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HYVYE2ZERFXDV6RMKK3I5SDSDQLPSEIQ/
https://security.netapp.com/advisory/ntap-20200413-0002/
https://usn.ubuntu.com/4458-1/
https://www.debian.org/security/2020/dsa-4757
https://www.oracle.com/security-alerts/cpuApr2021.html
https://www.oracle.com/security-alerts/cpujul2020.html
https://www.oracle.com/security-alerts/cpujul2022.html
Products affected by CVE-2020-1927
Apache
»
Http Server
»
Version:
2.4.0
cpe:2.3:a:apache:http_server:2.4.0
Apache
»
Http Server
»
Version:
2.4.1
cpe:2.3:a:apache:http_server:2.4.1
Apache
»
Http Server
»
Version:
2.4.10
cpe:2.3:a:apache:http_server:2.4.10
Apache
»
Http Server
»
Version:
2.4.11
cpe:2.3:a:apache:http_server:2.4.11
Apache
»
Http Server
»
Version:
2.4.12
cpe:2.3:a:apache:http_server:2.4.12
Apache
»
Http Server
»
Version:
2.4.13
cpe:2.3:a:apache:http_server:2.4.13
Apache
»
Http Server
»
Version:
2.4.14
cpe:2.3:a:apache:http_server:2.4.14
Apache
»
Http Server
»
Version:
2.4.15
cpe:2.3:a:apache:http_server:2.4.15
Apache
»
Http Server
»
Version:
2.4.16
cpe:2.3:a:apache:http_server:2.4.16
Apache
»
Http Server
»
Version:
2.4.17
cpe:2.3:a:apache:http_server:2.4.17
Apache
»
Http Server
»
Version:
2.4.18
cpe:2.3:a:apache:http_server:2.4.18
Apache
»
Http Server
»
Version:
2.4.19
cpe:2.3:a:apache:http_server:2.4.19
Apache
»
Http Server
»
Version:
2.4.2
cpe:2.3:a:apache:http_server:2.4.2
Apache
»
Http Server
»
Version:
2.4.20
cpe:2.3:a:apache:http_server:2.4.20
Apache
»
Http Server
»
Version:
2.4.21
cpe:2.3:a:apache:http_server:2.4.21
Apache
»
Http Server
»
Version:
2.4.22
cpe:2.3:a:apache:http_server:2.4.22
Apache
»
Http Server
»
Version:
2.4.23
cpe:2.3:a:apache:http_server:2.4.23
Apache
»
Http Server
»
Version:
2.4.24
cpe:2.3:a:apache:http_server:2.4.24
Apache
»
Http Server
»
Version:
2.4.25
cpe:2.3:a:apache:http_server:2.4.25
Apache
»
Http Server
»
Version:
2.4.26
cpe:2.3:a:apache:http_server:2.4.26
Apache
»
Http Server
»
Version:
2.4.27
cpe:2.3:a:apache:http_server:2.4.27
Apache
»
Http Server
»
Version:
2.4.28
cpe:2.3:a:apache:http_server:2.4.28
Apache
»
Http Server
»
Version:
2.4.29
cpe:2.3:a:apache:http_server:2.4.29
Apache
»
Http Server
»
Version:
2.4.3
cpe:2.3:a:apache:http_server:2.4.3
Apache
»
Http Server
»
Version:
2.4.30
cpe:2.3:a:apache:http_server:2.4.30
Apache
»
Http Server
»
Version:
2.4.31
cpe:2.3:a:apache:http_server:2.4.31
Apache
»
Http Server
»
Version:
2.4.32
cpe:2.3:a:apache:http_server:2.4.32
Apache
»
Http Server
»
Version:
2.4.33
cpe:2.3:a:apache:http_server:2.4.33
Apache
»
Http Server
»
Version:
2.4.34
cpe:2.3:a:apache:http_server:2.4.34
Apache
»
Http Server
»
Version:
2.4.35
cpe:2.3:a:apache:http_server:2.4.35
Apache
»
Http Server
»
Version:
2.4.36
cpe:2.3:a:apache:http_server:2.4.36
Apache
»
Http Server
»
Version:
2.4.37
cpe:2.3:a:apache:http_server:2.4.37
Apache
»
Http Server
»
Version:
2.4.38
cpe:2.3:a:apache:http_server:2.4.38
Apache
»
Http Server
»
Version:
2.4.39
cpe:2.3:a:apache:http_server:2.4.39
Apache
»
Http Server
»
Version:
2.4.4
cpe:2.3:a:apache:http_server:2.4.4
Apache
»
Http Server
»
Version:
2.4.40
cpe:2.3:a:apache:http_server:2.4.40
Apache
»
Http Server
»
Version:
2.4.41
cpe:2.3:a:apache:http_server:2.4.41
Apache
»
Http Server
»
Version:
2.4.5
cpe:2.3:a:apache:http_server:2.4.5
Apache
»
Http Server
»
Version:
2.4.6
cpe:2.3:a:apache:http_server:2.4.6
Apache
»
Http Server
»
Version:
2.4.7
cpe:2.3:a:apache:http_server:2.4.7
Apache
»
Http Server
»
Version:
2.4.8
cpe:2.3:a:apache:http_server:2.4.8
Apache
»
Http Server
»
Version:
2.4.9
cpe:2.3:a:apache:http_server:2.4.9
Netapp
»
Oncommand Unified Manager Core Package
»
Version:
N/A
cpe:2.3:a:netapp:oncommand_unified_manager_core_package:-
Oracle
»
Communications Element Manager
»
Version:
8.1.1
cpe:2.3:a:oracle:communications_element_manager:8.1.1
Oracle
»
Communications Element Manager
»
Version:
8.2.0
cpe:2.3:a:oracle:communications_element_manager:8.2.0
Oracle
»
Communications Element Manager
»
Version:
8.2.1
cpe:2.3:a:oracle:communications_element_manager:8.2.1
Oracle
»
Communications Session Report Manager
»
Version:
8.1.1
cpe:2.3:a:oracle:communications_session_report_manager:8.1.1
Oracle
»
Communications Session Report Manager
»
Version:
8.2.0
cpe:2.3:a:oracle:communications_session_report_manager:8.2.0
Oracle
»
Communications Session Report Manager
»
Version:
8.2.1
cpe:2.3:a:oracle:communications_session_report_manager:8.2.1
Oracle
»
Communications Session Route Manager
»
Version:
8.1.1
cpe:2.3:a:oracle:communications_session_route_manager:8.1.1
Oracle
»
Communications Session Route Manager
»
Version:
8.2.0
cpe:2.3:a:oracle:communications_session_route_manager:8.2.0
Oracle
»
Communications Session Route Manager
»
Version:
8.2.1
cpe:2.3:a:oracle:communications_session_route_manager:8.2.1
Oracle
»
Enterprise Manager Ops Center
»
Version:
12.4.0.0
cpe:2.3:a:oracle:enterprise_manager_ops_center:12.4.0.0
Oracle
»
Instantis Enterprisetrack
»
Version:
17.1
cpe:2.3:a:oracle:instantis_enterprisetrack:17.1
Oracle
»
Instantis Enterprisetrack
»
Version:
17.2
cpe:2.3:a:oracle:instantis_enterprisetrack:17.2
Oracle
»
Instantis Enterprisetrack
»
Version:
17.3
cpe:2.3:a:oracle:instantis_enterprisetrack:17.3
Oracle
»
Sd-Wan Aware
»
Version:
8.2
cpe:2.3:a:oracle:sd-wan_aware:8.2
Oracle
»
Zfs Storage Appliance Kit
»
Version:
8.8
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8
Broadcom
»
Brocade Fabric Operating System
»
Version:
N/A
cpe:2.3:o:broadcom:brocade_fabric_operating_system:-
Canonical
»
Ubuntu Linux
»
Version:
16.04
cpe:2.3:o:canonical:ubuntu_linux:16.04
Canonical
»
Ubuntu Linux
»
Version:
18.04
cpe:2.3:o:canonical:ubuntu_linux:18.04
Canonical
»
Ubuntu Linux
»
Version:
20.04
cpe:2.3:o:canonical:ubuntu_linux:20.04
Debian
»
Debian Linux
»
Version:
10.0
cpe:2.3:o:debian:debian_linux:10.0
Debian
»
Debian Linux
»
Version:
9.0
cpe:2.3:o:debian:debian_linux:9.0
Fedoraproject
»
Fedora
»
Version:
31
cpe:2.3:o:fedoraproject:fedora:31
Fedoraproject
»
Fedora
»
Version:
32
cpe:2.3:o:fedoraproject:fedora:32
Opensuse
»
Leap
»
Version:
15.1
cpe:2.3:o:opensuse:leap:15.1
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved