Partial Fix for Content-Type Based Configuration Ignores Use of Legacy Handlers, Leading to Source Code Disclosure
CVE-2024-40725
Key Information
- Vendor
- Apache
- Status
- Apache Http Server
- Vendor
- CVE Published:
- 18 July 2024
Badges
What is CVE-2024-40725?
CVE-2024-40725 is a vulnerability in the Apache HTTP Server version 2.4.61, which is widely used as a web server for delivering content over the internet. This vulnerability arises from a partial fix related to content-type configurations that disregard the use of certain legacy handlers. As a consequence, this flaw can lead to the unintended disclosure of sensitive source code, which can severely compromise an organization's security posture and expose it to further attacks.
Technical Details
The vulnerability stems from the misconfiguration of content-type handlers within the Apache HTTP Server, specifically in the "AddType" directive. When certain files are requested indirectly, the server may serve these files as downloadable content rather than processing them appropriately. This mismanagement opens a potential avenue for attackers to access source code, such as PHP scripts, which should ideally be executed on the server rather than exposed directly to users.
Organizations utilizing version 2.4.61 of the Apache HTTP Server are therefore at risk, as the issue has not been fully addressed in this version. Upgrading to version 2.4.62 is critical to close this security gap and consolidate protections against unintended source code disclosure.
Impact of the Vulnerability
-
Source Code Disclosure: The most significant impact of CVE-2024-40725 is the potential for source code disclosure, which can expose sensitive application logic and configuration files. This could lead to the leakage of proprietary information and intellectual property, making it easier for attackers to launch targeted exploits.
-
Increased Attack Surface: By allowing the leakage of sensitive files, this vulnerability increases the attack surface for organizations. Once attackers have access to the source code, they can identify weaknesses, craft specific exploits, and leverage this information for further compromise, including executing unauthorized commands on the server.
-
Reputation Damage: If an organization were compromised due to this vulnerability, it could suffer significant reputation damage. Clients and stakeholders may lose trust in the organization’s ability to secure sensitive data, which could lead to legal issues and financial repercussions.
Affected Version(s)
Apache HTTP Server <= 2.4.61
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
These vulnerabilities in Apache HTTP Server enable HTTP Request Smuggling and SSL Authentication Bypass, posing severe threats to organizations worldwide
PoC exploit codes are available for both vulnerabilities
3 months ago
CVE-2024-40725 and CVE-2024-40898 Vulnerabilities in Apache’s HTTP Server : Vulnerability Analysis and Exploitation - CYFIRMA
Published On : 2024-09-11 EXECUTIVE SUMMARY CVE-2024-40725 and CVE-2024-40898 are vulnerabilities in Apache’s HTTP Server. CVE-2024-40725 affects the mod_proxy module, where enabling the ProxyPass...
4 months ago
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
- 📰
First article discovered by cyfirma
- 🥇
Vulnerability reached the number 1 worldwide trending spot
- 📈
Vulnerability started trending
Vulnerability published
Vulnerability Reserved