Search This Blog

Tuesday, June 21, 2011

Risky Apache Web Server

Introduction
Everyone is under attack. It may be a Fortune 500 or a small corporate, automated attack tools scan the entire IP range and will burst the services with requests that identify weak spots. Even if you are serving an Intranet that is not visible to the general Internet, the possibility that people within your organization bring in Trojan horses when they connect their laptops to your network should be considered.

Web Server Survey

According to the survey conducted by the netcraft.com, a total of 239,611,111 web sites were reported as active till July 2009. Out of which the top, the majority developer shares were Apache with 47.17% and Microsoft with 23.34%. Of the active sites reported, the web sites running on Apache are 51.12% and Microsoft with 23.99%. The market share for the top servers across the Million Busiest sites, the Apache with 66.82% and Microsoft with 18.25%.
The above figures clearly show the majority share in terms of Web sites running on Apache is higher compared to its counterparts.
The following are most observed threats and the problem caused due to the threats and the respective mitigation. The countermeasures are briefed at the bottom for all.

Possible compromise through Apache misconfiguration

The default files and services provide a means for an attacker to bypass authentication methods and gain access to sensitive information and may be with elevated privileges.
 tip2.png Regular independent configuration assessments.

Compromise through a vulnerability of the application

The functional level of the application may cause problems by selecting the valid and invalid inputs.
 tip2.png Do not allow read/write access or compiler. 

Possible compromise through unmitigated Apache problems

The unmitigated Apache can cause problems if necessary mitigation steps are not taken.
 tip2.png Put Apache in jail, implement Kernel patches.

Apache update poses a danger to the bigger threat

The vulnerability referred to as Satisfy directory threat which allows an attacker to compromise access controls.
 tip2.pngOnly applies if you have updated to version 2.0.51.

Apache Struts Unspecified Cross-site scripting vulnerability

 Exploited by malicious people to conduct cross-site scripting attacks.
 tip2.png Filter malicious characters and character sequences in a web proxy.

DoS, buffer overflow flaws in Apache

The flaw could allow attackers to launch denial-of-service against systems running certain versions of Apache Web Server.
 tip2.png Update with latest patches.

Signals to arbitrary processes

 An attacker can manipulate and cause arbitrary processes to be terminated which could lead to a denial of service.
 tip2.pngAffects to only versions 2.2.4, 2.2.3, 2.2.2, 2.2.0

Apache Tomcat 'Request Dispatcher' Information Disclosure Vulnerability
 

Successful exploitation of this issue will allow attackers to obtain sensitive information that may lead to further attacks.
 tip2.png Update with latest patches.

Countermeasures

  • The Countermeasures for the above vulnerability issues is to: Keep Apache up-to-date.
  • Activity monitoring
  • Intrusion Detection
  • Have off-site backups and disaster recovery procedures
  • Understand the configuration
  • Disable unnecessary Apache Modules
  •  Remove Default/Unneeded Apache files
  • Authentication Mechanisms
  • Secure admin access

Add To Google BookmarksStumble ThisFav This With TechnoratiAdd To Del.icio.usDigg ThisAdd To RedditTwit ThisAdd To FacebookAdd To Yahoo

0 comments:

Post a Comment