CVE-2020-25073

NameCVE-2020-25073
DescriptionFreedomBox through 20.13 allows remote attackers to obtain sensitive information from the /server-status page of the Apache HTTP Server, because a connection from the Tor onion service (or from PageKite) is considered a local connection. This affects both the freedombox and plinth packages of some Linux distributions, but only if the Apache mod_status module is enabled.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
plinth (PTS)stretch0.13.1+ds-1fixed
buster19.1+deb10u2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
plinthsourcestretch(not affected)
plinthsourcebuster19.1+deb10u1
plinthsource(unstable)20.14

Notes

[stretch] - plinth <not-affected> (in-depth Apache integration added in 0.15.2)
https://salsa.debian.org/freedombox-team/freedombox/-/issues/1935
https://salsa.debian.org/freedombox-team/freedombox/-/commit/822c322d20d12f81c6cfca47b66f900542a5aac2

Search for package or bug name: Reporting problems