SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content
Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 18 Nov 2024 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 18 Nov 2024 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache Software Foundation
Apache Software Foundation apache Http Server |
|
CPEs | cpe:2.3:a:apache_software_foundation:apache_http_server:*:*:*:*:*:*:*:* | |
Vendors & Products |
Apache Software Foundation
Apache Software Foundation apache Http Server |
|
References |
|
|
Metrics |
ssvc
|
Mon, 18 Nov 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SSRF in Apache HTTP Server on Windows allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. | SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing. |
Tue, 24 Sep 2024 19:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Redhat
Redhat jboss Core Services |
|
CPEs | cpe:/a:redhat:jboss_core_services:1 | |
Vendors & Products |
Redhat
Redhat jboss Core Services |
Fri, 13 Sep 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-11-18T08:51:23.206Z
Reserved: 2024-06-17T11:02:50.595Z
Link: CVE-2024-38472

Updated: 2024-09-13T17:04:53.597Z

Status : Awaiting Analysis
Published: 2024-07-01T19:15:04.563
Modified: 2024-11-21T09:26:01.733
Link: CVE-2024-38472
