Code Execution or Source Code Disclosure Vulnerability in Apache HTTP Server's mod_rewrite

CVE-2024-38475

Currently unrated 🤨

Key Information

Vendor
Apache
Status
Apache Http Server
Vendor
CVE Published:
1 July 2024

Badges

👾 Exploit Exists🔴 Public PoC

Summary

Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure.

Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.

Affected Version(s)

Apache HTTP Server <= 2.4.59

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

Refferences

Timeline

  • 🔴

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)

Credit

Orange Tsai (@orange_8361) from DEVCORE
.