CVE-2024-43394

NameCVE-2024-43394
DescriptionServer-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4270-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
apache2 (PTS)bullseye2.4.62-1~deb11u1vulnerable
bullseye (security)2.4.65-1~deb11u1fixed
bookworm2.4.65-1~deb12u1fixed
bookworm (security)2.4.62-1~deb12u2fixed
trixie2.4.65-2fixed
forky, sid2.4.65-3fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
apache2sourcebullseye2.4.65-1~deb11u1DLA-4270-1
apache2source(unstable)(not affected)

Notes

- apache2 <not-affected> (Windows specific)
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2024-43394

Search for package or bug name: Reporting problems