Page MenuHomePhabricator

Vulnerabilities reported in Apache httpd version running on 185.15.56.30
Closed, ResolvedPublicSecurity

Description

The Security team scans the internet-facing edges of our IP ranges using an instance of the Nessus vulnerability scanner. This week, a single IP address - 185.15.56.30 - showed up in the reporting with two “high” findings around the reported version of Apache http installed. The two “high” findings on 185.15.56.30 are https://www.tenable.com/plugins/nessus/153583 (https://www.tenable.com/cve/CVE-2021-40438) and https://www.tenable.com/plugins/nessus/153584 (https://www.tenable.com/cve/CVE-2021-39275).

There are no known exploits for the two "High" findings for that IP address.

Details

Risk Rating
Low
Author Affiliation
Wikimedia Communities

Related Objects

Event Timeline

Done, deleted the instance and the float IP. Is anything else required?

bd808 assigned this task to Galahad.

Done, deleted the instance and the float IP. Is anything else required?

Nope. That gets rid of the problem for sure. :)

Upgrading the Apache2 package to 2.4.51-1~deb11u1 would have worked too, but if you weren't really using the instance it's nice to have the compute resources back.

With the instance deleted, is there any reason not to make this public? I'm guessing 185.15.56.30 isn't sensitive information for anybody.

With the instance deleted, is there any reason not to make this public? I'm guessing 185.15.56.30 isn't sensitive information for anybody.

185.15.56.30 is an IP that belongs to the Foundation and is in the network block used by Cloud VPS for public routing, so I agree that it is not PII or otherwise sensitive information. +1 from me for making the task public.

sbassett changed Author Affiliation from N/A to Wikimedia Communities.
sbassett changed the visibility from "Custom Policy" to "Public (No Login Required)".
sbassett changed the edit policy from "Custom Policy" to "All Users".
sbassett changed Risk Rating from N/A to Low.