Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache HTTP Server | 2.4.0 ~ 2.4.59 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/p0in7s/CVE-2024-38475 | POC Details |
| 2 | exploit CVE-2024-38475(mod_rewrite weakness with filesystem path matching) | https://github.com/soltanali0/CVE-2024-38475 | POC Details |
| 3 | Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-38475.yaml | POC Details |
| 4 | CVE-2024-38475 Scanner using FFUF + Seclists | https://github.com/syaifulandy/CVE-2024-38475 | POC Details |
| 5 | None | https://github.com/abrewer251/CVE-2024-38475_SonicBoom_Apache_URL_Traversal_PoC | POC Details |
No public POC found.
Login to generate AI POC| CVE-2024-36387 | Apache HTTP Server: DoS by Null pointer in websocket over HTTP/2 | |
| CVE-2024-38472 | Apache HTTP Server on WIndows UNC SSRF | |
| CVE-2024-38473 | Apache HTTP Server proxy encoding problem | |
| CVE-2024-38474 | Apache HTTP Server weakness with encoded question marks in backreferences | |
| CVE-2024-38476 | Apache HTTP Server may use exploitable/malicious backend application output to run local h | |
| CVE-2024-38477 | Apache HTTP Server: Crash resulting in Denial of Service in mod_proxy via a malicious requ | |
| CVE-2024-39573 | Apache HTTP Server: mod_rewrite proxy handler substitution |
No comments yet