CVE-2020-25073

NameCVE-2020-25073
DescriptionFreedomBox through 20.13 allows remote attackers to obtain sensitive information from the /server-status page of the Apache HTTP Server, because a connection from the Tor onion service (or from PageKite) is considered a local connection. This affects both the freedombox and plinth packages of some Linux distributions, but only if the Apache mod_status module is enabled.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
plinth (PTS)stretch0.13.1+ds-1vulnerable
buster19.1vulnerable
bullseye20.15fixed
sid20.16fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
plinthsource(unstable)20.14

Notes

[buster] - plinth <no-dsa> (Minor issue)
[stretch] - plinth <no-dsa> (Minor issue)
https://salsa.debian.org/freedombox-team/freedombox/-/issues/1935
https://salsa.debian.org/freedombox-team/freedombox/-/commit/822c322d20d12f81c6cfca47b66f900542a5aac2

Search for package or bug name: Reporting problems