I'm on the latest macOS (BigSur 11.4 20F71) and discovered a critical vulnerability in Apache httpd, which is located here /usr/sbin/httpd
. I never installed Apache httpd on my mac. /usr/sbin
is a Read-Only file system (Protected by SIP "System Integrity Protection") and it isn't possible to install anything in that folder, even as a root user, which makes me think that Apache http is bundled with BigSur by default. If so, how can I install the latest patch?
The vulnerable version is 2.4.46 and there's a fix in 2.4.47, but I've had real issues updating httpd.
> /usr/sbin/httpd -v
Server version: Apache/2.4.46 (Unix)
Server built: May 8 2021 03:38:34
Things I've tried so far:
- Install the latest version of httpd using homebrew. It installs the correct version in
/usr/local/bin
which isn't OK because it still leaves the vulnerable version intact. - Making any change to
/usr/sbin/httpd
throws a "Operation not permitted" error, which led me to try to Disable System Integrity Protection because it should make the file system writable. After disabling it I tried to manually install the latest version of the httpd binary into /usr/sbin/httpd, but I still get this error:/usr/sbin/httpd: Read-only file system
. It looks like it's not possible to disable SIP completely.
How can I resolve this? This vulnerability was discovered on June 6th, so it's over the 14 day limit required by a lot of InfoSec regulators to implement a fix.
For reference, here are the details of the vulnerability (From Nessus):
The version of Apache httpd installed on the remote host is prior to 2.4.47. It is, therefore, affected by multiple vulnerabilities as referenced in the 2.4.47 changelog:
Unexpected section matching with 'MergeSlashes OFF' (CVE-2021-30641)
mod_auth_digest: possible stack overflow by one nul byte while validating the Digest nonce. (CVE-2020-35452)
mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service with a malicious backend server and SessionHeader. (CVE-2021-26691)
mod_session: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service. (CVE-2021-26690)
mod_proxy_http: Fix possible crash due to NULL pointer dereference, which could be used to cause a Denial of Service. (CVE-2020-13950)
Windows: Prevent local users from stopping the httpd process (CVE-2020-13938)
mod_proxy_wstunnel, mod_proxy_http: Handle Upgradable protocols end-to-end negotiation. (CVE-2019-17567)