PT-2024-4434 · Apache +10 · Apache Http Server +10
Orange_8361
·
Published
2024-07-01
·
Updated
2025-07-17
·
CVE-2024-38475
9.4
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:N |
**Name of the Vulnerable Software and Affected Versions:**
Apache HTTP Server versions 2.4.59 and earlier
Apache2 versions 2.4.41-4ubuntu3.23 (for Ubuntu)
Apache2 versions 2.4.61-1.1 (for openSUSE Tumbleweed)
Apache2 versions 2.4.61-alt1
**Description:**
A flaw exists in the `mod rewrite` module of Apache HTTP Server due to improper escaping of output. This allows an attacker to map URLs to filesystem locations that are permitted to be served by the server, even if those locations are not directly accessible via URL. This can result in code execution or source code disclosure. The vulnerability has been actively exploited in the wild, including attacks targeting SonicWall SMA devices.
**Recommendations:**
Upgrade Apache HTTP Server to version 2.4.60 or later.
Upgrade Apache2 to version 2.4.61-1~deb11u1 for the oldstable distribution (bullseye) or 2.4.61-1~deb12u1 for the stable distribution (bookworm).
Upgrade Apache2 to version 2.4.61-1.1 for openSUSE Tumbleweed.
Upgrade Apache2 to version 2.4.61-alt1.
Exploit
Fix
RCE
Improper Encoding or Escaping of Output
Weakness Enumeration
Related Identifiers
Affected Products
References · 304
- 🔥 https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-Template⭐ 29 🔗 7 · Exploit
- 🔥 https://github.com/p0in7s/CVE-2024-38475⭐ 14 🔗 3 · Exploit
- 🔥 https://github.com/Abdurahmon3236/CVE-2024-38473⭐ 3 🔗 2 · Exploit
- 🔥 https://github.com/Abdurahmon3236/CVE-2024-38472⭐ 3 · Exploit
- https://github.com/apache/httpd/commit/9a6157d1e2f7ab15963020381054b48782bc18cf⭐ 3717 🔗 1179 · Patch
- https://safe-surf.ru/specialists/bulletins-nkcki/714671 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/715203 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/718224 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/713188 · Security Note
- https://ubuntu.com/security/CVE-2024-38477 · Vendor Advisory
- https://safe-surf.ru/specialists/bulletins-nkcki/721806 · Security Note
- https://osv.dev/vulnerability/USN-6885-1 · Vendor Advisory
- https://wiki.astralinux.ru/astra-linux-se17-bulletin-2024-0830SE17 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38473 · Security Note
- https://safe-surf.ru/specialists/bulletins-nkcki/718225 · Security Note