CVE-2021-40438

NameCVE-2021-40438
DescriptionA crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-2776-1, DSA-4982-1
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)stretch2.4.25-3+deb9u9vulnerable
stretch (security)2.4.25-3+deb9u11fixed
buster2.4.38-3+deb10u5vulnerable
buster (security)2.4.38-3+deb10u6fixed
bullseye2.4.48-3.1+deb11u1vulnerable
bullseye (security)2.4.51-1~deb11u1fixed
bookworm, sid2.4.51-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2sourcestretch2.4.25-3+deb9u11DLA-2776-1
apache2sourcebuster2.4.38-3+deb10u6DSA-4982-1
apache2sourcebullseye2.4.51-1~deb11u1DSA-4982-1
apache2source(unstable)2.4.49-1

Notes

https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-40438
Minimal fix: https://github.com/apache/httpd/commit/496c863776c68bd08cdbeb7d8fa5935ba63b76c2 (2.4.x)
Future-proof follow-up: https://github.com/apache/httpd/commit/d4901cb32133bc0e59ad193a29d1665597080d67 (2.4.x)
Regression fix #1: https://github.com/apache/httpd/commit/6e768a811c59ca6a0769b72681aaef381823339f (2.4.x)
Regression fix #2: https://github.com/apache/httpd/commit/81a8b0133b46c4cf7dfc4b5476ad46eb34aa0a5c (2.4.x)

Search for package or bug name: Reporting problems