SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing.
History

Fri, 22 Nov 2024 12:00:00 +0000


Mon, 18 Nov 2024 09:30:00 +0000

Type Values Removed Values Added
References

Mon, 18 Nov 2024 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Apache Software Foundation
Apache Software Foundation apache Http Server
CPEs cpe:2.3:a:apache_software_foundation:apache_http_server:*:*:*:*:*:*:*:*
Vendors & Products Apache Software Foundation
Apache Software Foundation apache Http Server
References
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 18 Nov 2024 09:00:00 +0000

Type Values Removed Values Added
Description SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing.

Tue, 24 Sep 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Redhat
Redhat jboss Core Services
CPEs cpe:/a:redhat:jboss_core_services:1
Vendors & Products Redhat
Redhat jboss Core Services

Fri, 13 Sep 2024 18:30:00 +0000

Type Values Removed Values Added
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2024-07-01T18:12:27.616Z

Updated: 2024-11-18T08:51:23.206Z

Reserved: 2024-06-17T11:02:50.595Z

Link: CVE-2024-38472

cve-icon Vulnrichment

Updated: 2024-09-13T17:04:53.597Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-01T19:15:04.563

Modified: 2024-11-21T09:26:01.733

Link: CVE-2024-38472

cve-icon Redhat

Severity : Important

Publid Date: 2024-07-01T00:00:00Z

Links: CVE-2024-38472 - Bugzilla