4get-modified

Installation

Install from the command line using your preferred container software:

Docker

docker pull oci.registry.sudovanilla.org/4get-modified:arm64

Podman

podman pull oci.registry.sudovanilla.org/4get-modified:arm64

Vulnerabilities

CRITICAL

libxml: Heap use after free (UAF) leads to Denial of service (DoS)

CVE-2025-49794

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

Reference: https://avd.aquasec.com/nvd/cve-2025-49794

CRITICAL

libxml: Type confusion leads to Denial of service (DoS)

CVE-2025-49796

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

Reference: https://avd.aquasec.com/nvd/cve-2025-49796

HIGH

httpd: insufficient escaping of user-supplied data in mod_ssl

CVE-2024-47252

Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.

Reference: https://avd.aquasec.com/nvd/cve-2024-47252

HIGH

httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption

CVE-2025-23048

In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.

Reference: https://avd.aquasec.com/nvd/cve-2025-23048

HIGH

libxml2: Out-of-Bounds Read in libxml2

CVE-2025-32414

In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.

Reference: https://avd.aquasec.com/nvd/cve-2025-32414

HIGH

libxml2: Out-of-bounds Read in xmlSchemaIDCFillNodeTables

CVE-2025-32415

In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used.

Reference: https://avd.aquasec.com/nvd/cve-2025-32415

HIGH

httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module

CVE-2025-49630

In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".

Reference: https://avd.aquasec.com/nvd/cve-2025-49630

HIGH

libxml: Null pointer dereference leads to Denial of service (DoS)

CVE-2025-49795

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

Reference: https://avd.aquasec.com/nvd/cve-2025-49795

HIGH

httpd: HTTP Session Hijack via a TLS upgrade

CVE-2025-49812

In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.

Reference: https://avd.aquasec.com/nvd/cve-2025-49812

HIGH

mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals

CVE-2025-55753

An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.

Reference: https://avd.aquasec.com/nvd/cve-2025-55753

Not Signed