### [CVE-2019-0215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0215) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Access%20Control%20Bypass&color=brighgreen) ### Description In Apache HTTP Server 2.4 releases 2.4.37 and 2.4.38, a bug in mod_ssl when using per-location client certificate verification with TLSv1.3 allowed a client to bypass configured access control restrictions. ### POC #### Reference - https://www.oracle.com/security-alerts/cpuapr2020.html - https://www.oracle.com/security-alerts/cpujan2020.html - https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html #### Github - https://github.com/Solhack/Team_CSI_platform - https://github.com/jdryan1217/Pen-Test-Report - https://github.com/rmtec/modeswitcher - https://github.com/vshaliii/Vegeta1-Vulhub-Walkthrough