![]() |
|
Message-ID: <ffdab13f-5e81-388d-0679-cb5b08525608@apache.org> Date: Thu, 10 Jul 2025 17:13:47 +0000 From: Eric Covener <covener@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-43394: Apache HTTP Server: SSRF on Windows due to UNC paths Severity: moderate Affected versions: - Apache HTTP Server 2.4.0 through 2.4.63 Description: Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication. Credit: Kainan Zhang (@4xpl0r3r) from Fortinet (finder) References: https://httpd.apache.org/security/vulnerabilities_24.html https://httpd.apache.org/ https://www.cve.org/CVERecord?id=CVE-2024-43394 Timeline: 2024-08-10: reported 2025-07-07: 2.4.x revision 1927041
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.