Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-38473— Apache HTTP Server proxy encoding problem

EPSS 88.36% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-38473

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache HTTP Server proxy encoding problem
Source: NVD (National Vulnerability Database)
Vulnerability Description
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对输出编码和转义不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache HTTP Server 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点。 Apache HTTP Server 2.4.59及之前版本中存在安全漏洞,该漏洞源于mod_proxy存在编码问题,可能通过精心设计的请求绕过身份验证。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache HTTP Server 2.4.0 ~ 2.4.59 -

II. Public POCs for CVE-2024-38473

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/Abdurahmon3236/CVE-2024-38473POC Details
2Nuclei template to detect Apache servers vulnerable to CVE-2024-38473https://github.com/juanschallibaum/CVE-2024-38473-Nuclei-TemplatePOC Details
3Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38473.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-38473

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2024-07-01 · 8 CVEs total

CVE-2024-36387Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2
CVE-2024-38472Apache HTTP Server on WIndows UNC SSRF
CVE-2024-38474Apache HTTP Server weakness with encoded question marks in backreferences
CVE-2024-38475Apache HTTP Server weakness in mod_rewrite when first segment of substitution matches file
CVE-2024-38476Apache HTTP Server may use exploitable/malicious backend application output to run local h
CVE-2024-38477Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious requ
CVE-2024-39573Apache HTTP Server: mod_rewrite proxy handler substitution

IV. Related Vulnerabilities

V. Comments for CVE-2024-38473

No comments yet


Leave a comment