Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-40898 PoC — Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows

Source
Associated Vulnerability
Title:Apache HTTP Server: SSRF with mod_rewrite in server/vhost context on Windows (CVE-2024-40898)
Description:SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. 
Description
This Python script is a Proof-of-Concept (PoC) scanner for detecting the vulnerability CVE-2024-40898, which affects Apache HTTP Server’s SSL certificate validation.  
Readme
CVE-2024-40898 SSL Certificate Validation Bypass Scanner

This repository contains a Python-based proof-of-concept (PoC) script to detect CVE-2024-40898, a vulnerability in Apache HTTP Server that allows attackers to bypass SSL certificate verification.

Overview

CVE-2024-40898 is a security issue in Apache HTTP Server which, under specific conditions, permits clients to bypass certificate validation. This could potentially allow man-in-the-middle (MitM) attacks over TLS.

What This Script Does
	•	Reads a list of host:port pairs from ssl-ports.txt.
	•	For each entry:
	•	Establishes a TLS connection using a custom SSL context that disables certificate validation.
	•	Sends a HEAD / request to the server.
	•	Analyzes the response:
	•	If the response includes 200 OK, the target is marked as potentially vulnerable.
	•	If no such response is returned, the target is marked as safe.
	•	If any exception occurs, it is logged as an error.

Requirements
	•	Python 3.x

How to Use
	1.	Create a file named ssl-ports.txt with one target per line in the format:
                    
		      api.example.com:443
		      
                      www.site.org:443
		      
                      secure.service.net:443
2.	Run the script:

  	      python3 check_cve_40898.py
4.	View the results:
[VULNERABLE] domain.com:443
[SAFE] domain.com:443
[ERROR] domain.com:443 => <error message>
Notes
	•	This is an automated scanner. It will test all domains listed in ssl-ports.txt and print the results.
	•	Make sure your domain list is accurate and within your testing scope.
File Snapshot

[4.0K] /data/pocs/6553e4b3f4751394643cc8d2126a01fa9f099005 ├── [1.1K] check_cve_40898.py ├── [ 220] Disclaimer ├── [1.0K] LICENSE ├── [1.5K] README.md └── [1.1K] Script 0 directories, 5 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →