CVE-2024-38472

Scores

EPSS

0.905high90.5%
0%20%40%60%80%100%

Percentile: 90.5%

CVSS

7.5high3.x
0246810

CVSS Score: 7.5/10

All CVSS Scores

CVSS 3.x
7.5

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Description

SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content
Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive “UNCList” to allow access during request processing.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

anchore_overridesdebiannvdubuntu

CWEs

CWE-918

Related Vulnerabilities

Exploits

Exploit ID: CVE-2024-38472

Source: github-poc

URL: https://github.com/Abdurahmon3236/CVE-2024-38472

Vulnerable Software (8)

Type: Configuration

Operating System:

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",          "versionEndExcluding": "2.4.60",          "versionStartIncluding...

Source: anchore_overrides

Type: Configuration

Product: apache2

Operating System: ubuntu focal 20.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu jammy 22.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu mantic 23.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: ubuntu noble 24.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: apache2

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: http_server

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",      "versionEndExcluding": "2.4.60",      "versionStartIncluding": "2.4.0",      "vulnerable": true    }...

Source: nvd

Type: Configuration

Vendor: *

Product: ontap

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list