CVE-2024-38475
Apache HTTP Server Improper Escaping of Output Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
YesDecision
Descriptions
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
El escape inadecuado de la salida en mod_rewrite en Apache HTTP Server 2.4.59 y versiones anteriores permite a un atacante asignar URL a ubicaciones del sistema de archivos que el servidor permite servir, pero a las que no se puede acceder intencional o directamente mediante ninguna URL, dando como resultado la ejecución del código o la divulgación del código fuente. Las sustituciones en el contexto del servidor que utilizan referencias inversas o variables como primer segmento de la sustitución se ven afectadas. Este cambio romperá algunas RewiteRules inseguras y el indicador de reescritura "UnsafePrefixStat" se puede usar para volver a participar una vez que se garantice que la sustitución esté restringida adecuadamente.
A flaw was found in the mod_rewrite module of httpd. Improper escaping of output allows an attacker to map URLs to filesystem locations permitted to be served by the server but are not intentionally or directly reachable by any URL. This issue results in code execution or source code disclosure.
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
This update for apache2 fixes the following issues. Fixed DoS by null pointer in websocket over HTTP/2. Fixed improper escaping of output in mod_rewrite. Fixed server may use exploitable/malicious backend application output to run local handlers via internal redirect.
Apache HTTP Server contains an improper escaping of output vulnerability in mod_rewrite that allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2024-06-17 CVE Reserved
- 2024-07-01 CVE Published
- 2024-08-18 First Exploit
- 2025-05-01 Exploited in Wild
- 2025-05-02 CVE Updated
- 2025-05-22 KEV Due Date
- 2025-06-15 EPSS Updated
CWE
- CWE-116: Improper Encoding or Escaping of Output
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://security.netapp.com/advisory/ntap-20240712-0001 |
|
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/183152 | 2024-12-13 | |
https://github.com/p0in7s/CVE-2024-38475 | 2024-08-18 | |
https://github.com/soltanali0/CVE-2024-38475 | 2024-12-12 | |
https://github.com/syaifulandy/CVE-2024-38475 | 2025-05-09 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://httpd.apache.org/security/vulnerabilities_24.html | 2024-07-12 | |
https://access.redhat.com/security/cve/CVE-2024-38475 | 2024-08-13 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2295014 | 2024-08-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Software Foundation Search vendor "Apache Software Foundation" | Apache HTTP Server Search vendor "Apache Software Foundation" for product "Apache HTTP Server" | >= 2.4.0 <= 2.4.59 Search vendor "Apache Software Foundation" for product "Apache HTTP Server" and version " >= 2.4.0 <= 2.4.59" | en |
Affected
|