diff --git a/cve/apache/2020/yaml/CVE-2020-9490.yaml b/cve/apache/2020/yaml/CVE-2020-9490.yaml new file mode 100644 index 0000000000000000000000000000000000000000..84888dbf308aaa0e8467a831cecbddc9e8f4617e --- /dev/null +++ b/cve/apache/2020/yaml/CVE-2020-9490.yaml @@ -0,0 +1,23 @@ +id: CVE-2020-9490 +source: + - https://bugs.chromium.org/p/project-zero/issues/detail?id=2030 + - https://bugs.chromium.org/p/project-zero/issues/attachmentText?aid=443369 +info: + name: Apache HTTP Server(简称 Apache)是开源的 Web 服务器,可以在大多数计算机操作系统中运行,由于其多平台和安全性被广泛使用,是最流行的 Web 服务器端软件之一。它快速、可靠并且可通过简单的 API 扩展,将 Perl/Python 等解释器编译到服务器中。 + severity: high + description: | + Apache HTTP Server 2.4.20版本至2.4.43版本中存在安全漏洞,攻击者可借助‘Cache-Digest’标头中带有特制值的HTTP/2请求利用该漏洞造成Push Diary崩溃。 + scope-of-influence: + Apache HTTP = 2.4.20-2.4.43 + reference: + - https://nvd.nist.gov/vuln/detail/CVE-2020-9490 + - https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2020-9490 + + classification: + cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H + cvss-score: 7.5 + cve-id: CVE-2020-9490 + cwe-id: CWE-444 + cnvd-id: None + kve-id: None + tags: cve2020, Apache, Dos \ No newline at end of file