Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38472— Apache HTTP Server on WIndows UNC SSRF

EPSS 90.55% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-38472

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache HTTP Server on WIndows UNC SSRF
Source: NVD (National Vulnerability Database)
Vulnerability Description
SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
服务端请求伪造(SSRF)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache HTTP Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.59及之前版本存在安全漏洞,该漏洞源于存在服务端请求伪造漏洞(SSRF),允许攻击者通过恶意请求或内容泄露NTML哈希值。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache HTTP Server 2.4.0 ~ 2.4.59 -

II. Public POCs for CVE-2024-38472

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Abdurahmon3236/CVE-2024-38472POC Details
2SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note- Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38472.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-38472

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2024-07-01 · 8 CVEs total

CVE-2024-36387Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2
CVE-2024-38473Apache HTTP Server proxy encoding problem
CVE-2024-38474Apache HTTP Server weakness with encoded question marks in backreferences
CVE-2024-38475Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches file
CVE-2024-38476Apache HTTP Server may use exploitable/malicious backend application output to run local h
CVE-2024-38477Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious requ
CVE-2024-39573Apache HTTP Server: mod_rewrite proxy handler substitution

IV. Related Vulnerabilities

V. Comments for CVE-2024-38472

No comments yet


Leave a comment