<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Vulnerabilities Lighttpd in the HPE OfficeConnect Switch 1820 24G J9980A in Other HPE Product Questions</title>
    <link>https://community.hpe.com/t5/other-hpe-product-questions/vulnerabilities-lighttpd-in-the-hpe-officeconnect-switch-1820/m-p/7226475#M7479</link>
    <description>&lt;P&gt;In our inspection routines we found vulnerabilities in the &lt;STRONG&gt;HPE OfficeConnect Switch 1820 24G J9980A&lt;/STRONG&gt;.&lt;BR /&gt;vulnerabilities: Lighttpd &amp;lt; 1.4.35 Multiple Vulnerabilities - Active Check&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability Insight&lt;/STRONG&gt;&lt;BR /&gt;The following flaws exist:&lt;BR /&gt;- mod_mysql_vhost module is not properly sanitizing user supplied input passed via the host-&lt;BR /&gt;name&lt;BR /&gt;- mod_evhost and mod_simple_vhost modules are not properly sanitizing user supplied input&lt;BR /&gt;via the hostname.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability Detection Method&lt;/STRONG&gt;&lt;BR /&gt;Sends a crafted HTTP GET request and checks the response.&lt;BR /&gt;Details: Lighttpd &amp;lt; 1.4.35 Multiple Vulnerabilities - Active Check&lt;BR /&gt;OID:1.3.6.1.4.1.25623.1.0.802072&lt;BR /&gt;Version used: 2023-02-01T10:08:40Z&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;BR /&gt;cve: CVE-2014-2323&lt;BR /&gt;cve: CVE-2014-2324&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I need help on how to resolve this vulnerability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 02 Oct 2024 16:49:40 GMT</pubDate>
    <dc:creator>paulo_rribeiro</dc:creator>
    <dc:date>2024-10-02T16:49:40Z</dc:date>
    <item>
      <title>Vulnerabilities Lighttpd in the HPE OfficeConnect Switch 1820 24G J9980A</title>
      <link>https://community.hpe.com/t5/other-hpe-product-questions/vulnerabilities-lighttpd-in-the-hpe-officeconnect-switch-1820/m-p/7226475#M7479</link>
      <description>&lt;P&gt;In our inspection routines we found vulnerabilities in the &lt;STRONG&gt;HPE OfficeConnect Switch 1820 24G J9980A&lt;/STRONG&gt;.&lt;BR /&gt;vulnerabilities: Lighttpd &amp;lt; 1.4.35 Multiple Vulnerabilities - Active Check&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability Insight&lt;/STRONG&gt;&lt;BR /&gt;The following flaws exist:&lt;BR /&gt;- mod_mysql_vhost module is not properly sanitizing user supplied input passed via the host-&lt;BR /&gt;name&lt;BR /&gt;- mod_evhost and mod_simple_vhost modules are not properly sanitizing user supplied input&lt;BR /&gt;via the hostname.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Vulnerability Detection Method&lt;/STRONG&gt;&lt;BR /&gt;Sends a crafted HTTP GET request and checks the response.&lt;BR /&gt;Details: Lighttpd &amp;lt; 1.4.35 Multiple Vulnerabilities - Active Check&lt;BR /&gt;OID:1.3.6.1.4.1.25623.1.0.802072&lt;BR /&gt;Version used: 2023-02-01T10:08:40Z&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;References&lt;/STRONG&gt;&lt;BR /&gt;cve: CVE-2014-2323&lt;BR /&gt;cve: CVE-2014-2324&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I need help on how to resolve this vulnerability&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 02 Oct 2024 16:49:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/other-hpe-product-questions/vulnerabilities-lighttpd-in-the-hpe-officeconnect-switch-1820/m-p/7226475#M7479</guid>
      <dc:creator>paulo_rribeiro</dc:creator>
      <dc:date>2024-10-02T16:49:40Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities Lighttpd in the HPE OfficeConnect Switch 1820 24G J9980A</title>
      <link>https://community.hpe.com/t5/other-hpe-product-questions/vulnerabilities-lighttpd-in-the-hpe-officeconnect-switch-1820/m-p/7226485#M7480</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.hpe.com/t5/user/viewprofilepage/user-id/2349708"&gt;@paulo_rribeiro&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Thank you for posting.&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;HPE Networking forum has moved to Aruba Airheads Community and for HPE networking and Aruba product queries, we request you to visit and post your query here:&amp;nbsp;&lt;A tabindex="-1" title="https://community.arubanetworks.com/discussion" href="https://community.arubanetworks.com/discussion" target="_blank" rel="noopener noreferrer nofollow" aria-label="Link Aruba Airheads Community"&gt;Aruba Airheads Community&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;You can refer to the below link as well for more details:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.hpe.com/t5/Announcements/HPE-Networking-forum-migration-to-Aruba-Airheads-community-Nov/m-p/7150664" target="_blank" rel="noopener"&gt;HPE Networking forum migration to Aruba Airheads c... - Hewlett Packard Enterprise Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Oct 2024 04:03:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/other-hpe-product-questions/vulnerabilities-lighttpd-in-the-hpe-officeconnect-switch-1820/m-p/7226485#M7480</guid>
      <dc:creator>Sunitha_Mod</dc:creator>
      <dc:date>2024-10-03T04:03:03Z</dc:date>
    </item>
  </channel>
</rss>

