<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Guidance for Apache HTTP Server 2.4 vulnerabilities in Expedition Articles</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-articles/guidance-for-apache-http-server-2-4-vulnerabilities/ta-p/565953</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;LI-SPOILER&gt;&lt;FONT color="#FF6600"&gt;Last update 23/MAY/2024&amp;nbsp;&lt;/FONT&gt;&lt;/LI-SPOILER&gt;
&lt;H2&gt;Advisory:&lt;/H2&gt;
&lt;P&gt;Guidance for Apache HTTP Server 2.4 vulnerabilities described in the official apache.org site:&amp;nbsp; &lt;A href="https://httpd.apache.org/security/vulnerabilities_24.html" target="_blank"&gt;https://httpd.apache.org/security/vulnerabilities_24.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Affected version&lt;/STRONG&gt;:Fix for CVE detected on Apache HTTP Server 2.4 versions from 2.4.1 to 2.4.59.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="table"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="cve-header"&gt;Update 2.4.59 released&lt;/TD&gt;
&lt;TD class="cve-value"&gt;&lt;SPAN&gt;2024-04-04&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cve-header"&gt;Affects&lt;/TD&gt;
&lt;TD class="cve-value"&gt;&amp;lt;=2.4.58&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;H2&gt;Diagnosis&lt;/H2&gt;
&lt;P&gt;Execute below command to check the version of Apache HTTP Server 2.4:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sudo apt list --installed | grep apache&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="error"&gt;If the output showing version less than&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;2.4.59&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;, you will need to perform the steps to upgrade the apache2 libraries.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;H2&gt;Solution&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites:&amp;nbsp;&lt;/STRONG&gt;Your Expedition VM should have connectivity to&amp;nbsp;&lt;A href="http://ppa.launchpad.net/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;http://ppa.launchpad.net&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;and subdomains. ONLY required to do the libraries upgrade.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Optionally consider to take an snapshot of your VM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Expedition CLI execute below commands:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Update the package repository:&lt;BR /&gt;&lt;STRONG&gt;sudo apt-add-repository ppa:ondrej/apache2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Install deb lib packages:&lt;BR /&gt;&lt;STRONG&gt;sudo apt-get install apache2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Check packages are installed&lt;BR /&gt;&lt;STRONG&gt;sudo apt list --installed | grep apache&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Expected output:&lt;/EM&gt; &lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;apache2-bin/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 amd64 [installed,automatic]
apache2-data/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 all [installed,automatic]
apache2-utils/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 amd64 [installed,automatic]
apache2/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 amd64 [installed]
libapache2-mod-php7.0/now 7.0.33-57+ubuntu20.04.1+deb.sury.org+1 amd64 [installed,upgradable to: 7.0.33-74+ubuntu20.04.1+deb.sury.org+1]&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Make /tmp folder writable for apache2 service
&lt;UL&gt;
&lt;LI&gt;Open file to edit: &lt;STRONG&gt;sudo vi /lib/systemd/system/apache2.&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;service&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Change setting PrivateTmp from true to false (PrivateTmp=false)&lt;/LI&gt;
&lt;LI&gt;Save file and restart below services:&amp;nbsp;&lt;STRONG&gt;sudo systemctl daemon-reload&lt;/STRONG&gt;; &lt;STRONG&gt;sudo systemctl restart apache2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Access via UI and restart the Task Management&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Thu, 23 May 2024 16:41:34 GMT</pubDate>
    <dc:creator>dpuigdomenec</dc:creator>
    <dc:date>2024-05-23T16:41:34Z</dc:date>
    <item>
      <title>Guidance for Apache HTTP Server 2.4 vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/guidance-for-apache-http-server-2-4-vulnerabilities/ta-p/565953</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;DIV class="lia-message-template-symptoms-zone"&gt;
&lt;LI-SPOILER&gt;&lt;FONT color="#FF6600"&gt;Last update 23/MAY/2024&amp;nbsp;&lt;/FONT&gt;&lt;/LI-SPOILER&gt;
&lt;H2&gt;Advisory:&lt;/H2&gt;
&lt;P&gt;Guidance for Apache HTTP Server 2.4 vulnerabilities described in the official apache.org site:&amp;nbsp; &lt;A href="https://httpd.apache.org/security/vulnerabilities_24.html" target="_blank"&gt;https://httpd.apache.org/security/vulnerabilities_24.html&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Affected version&lt;/STRONG&gt;:Fix for CVE detected on Apache HTTP Server 2.4 versions from 2.4.1 to 2.4.59.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;TABLE class="table"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD class="cve-header"&gt;Update 2.4.59 released&lt;/TD&gt;
&lt;TD class="cve-value"&gt;&lt;SPAN&gt;2024-04-04&lt;/SPAN&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD class="cve-header"&gt;Affects&lt;/TD&gt;
&lt;TD class="cve-value"&gt;&amp;lt;=2.4.58&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-diagnosis-zone"&gt;
&lt;H2&gt;Diagnosis&lt;/H2&gt;
&lt;P&gt;Execute below command to check the version of Apache HTTP Server 2.4:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;sudo apt list --installed | grep apache&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN class="error"&gt;If the output showing version less than&amp;nbsp;&lt;SPAN&gt;&lt;STRONG&gt;2.4.59&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN&gt;, you will need to perform the steps to upgrade the apache2 libraries.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;
&lt;DIV class="lia-message-template-solution-zone"&gt;
&lt;H2&gt;Solution&lt;/H2&gt;
&lt;P&gt;&lt;STRONG&gt;Prerequisites:&amp;nbsp;&lt;/STRONG&gt;Your Expedition VM should have connectivity to&amp;nbsp;&lt;A href="http://ppa.launchpad.net/" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;http://ppa.launchpad.net&lt;/SPAN&gt;&lt;/A&gt;&amp;nbsp;and subdomains. ONLY required to do the libraries upgrade.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Note:&lt;/STRONG&gt; Optionally consider to take an snapshot of your VM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In Expedition CLI execute below commands:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Update the package repository:&lt;BR /&gt;&lt;STRONG&gt;sudo apt-add-repository ppa:ondrej/apache2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Install deb lib packages:&lt;BR /&gt;&lt;STRONG&gt;sudo apt-get install apache2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Check packages are installed&lt;BR /&gt;&lt;STRONG&gt;sudo apt list --installed | grep apache&lt;/STRONG&gt;&lt;BR /&gt;&lt;EM&gt;Expected output:&lt;/EM&gt; &lt;BR /&gt;&lt;LI-CODE lang="markup"&gt;apache2-bin/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 amd64 [installed,automatic]
apache2-data/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 all [installed,automatic]
apache2-utils/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 amd64 [installed,automatic]
apache2/focal,now 2.4.59-1+ubuntu20.04.1+deb.sury.org+1 amd64 [installed]
libapache2-mod-php7.0/now 7.0.33-57+ubuntu20.04.1+deb.sury.org+1 amd64 [installed,upgradable to: 7.0.33-74+ubuntu20.04.1+deb.sury.org+1]&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;Make /tmp folder writable for apache2 service
&lt;UL&gt;
&lt;LI&gt;Open file to edit: &lt;STRONG&gt;sudo vi /lib/systemd/system/apache2.&lt;WBR style="font-family: inherit;" /&gt;&lt;SPAN&gt;service&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI&gt;Change setting PrivateTmp from true to false (PrivateTmp=false)&lt;/LI&gt;
&lt;LI&gt;Save file and restart below services:&amp;nbsp;&lt;STRONG&gt;sudo systemctl daemon-reload&lt;/STRONG&gt;; &lt;STRONG&gt;sudo systemctl restart apache2&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;Access via UI and restart the Task Management&lt;/LI&gt;
&lt;/OL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 23 May 2024 16:41:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/guidance-for-apache-http-server-2-4-vulnerabilities/ta-p/565953</guid>
      <dc:creator>dpuigdomenec</dc:creator>
      <dc:date>2024-05-23T16:41:34Z</dc:date>
    </item>
  </channel>
</rss>

