Partial Fix for Content-Type Based Configuration Ignores Use of Legacy Handlers, Leading to Source Code Disclosure

CVE-2024-40725

5.3MEDIUM

Key Information

Vendor
Apache
Status
Apache Http Server
Vendor
CVE Published:
18 July 2024

Badges

🥇 Trended No. 1📈 Trended📈 Score: 5,590👾 Exploit Exists🟡 Public PoC📰 News Worthy

What is CVE-2024-40725?

CVE-2024-40725 is a vulnerability in the Apache HTTP Server version 2.4.61, which is widely used as a web server for delivering content over the internet. This vulnerability arises from a partial fix related to content-type configurations that disregard the use of certain legacy handlers. As a consequence, this flaw can lead to the unintended disclosure of sensitive source code, which can severely compromise an organization's security posture and expose it to further attacks.

Technical Details

The vulnerability stems from the misconfiguration of content-type handlers within the Apache HTTP Server, specifically in the "AddType" directive. When certain files are requested indirectly, the server may serve these files as downloadable content rather than processing them appropriately. This mismanagement opens a potential avenue for attackers to access source code, such as PHP scripts, which should ideally be executed on the server rather than exposed directly to users.

Organizations utilizing version 2.4.61 of the Apache HTTP Server are therefore at risk, as the issue has not been fully addressed in this version. Upgrading to version 2.4.62 is critical to close this security gap and consolidate protections against unintended source code disclosure.

Impact of the Vulnerability

  1. Source Code Disclosure: The most significant impact of CVE-2024-40725 is the potential for source code disclosure, which can expose sensitive application logic and configuration files. This could lead to the leakage of proprietary information and intellectual property, making it easier for attackers to launch targeted exploits.

  2. Increased Attack Surface: By allowing the leakage of sensitive files, this vulnerability increases the attack surface for organizations. Once attackers have access to the source code, they can identify weaknesses, craft specific exploits, and leverage this information for further compromise, including executing unauthorized commands on the server.

  3. Reputation Damage: If an organization were compromised due to this vulnerability, it could suffer significant reputation damage. Clients and stakeholders may lose trust in the organization’s ability to secure sensitive data, which could lead to legal issues and financial repercussions.

Affected Version(s)

Apache HTTP Server <= 2.4.61

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

These vulnerabilities in Apache HTTP Server enable HTTP Request Smuggling and SSL Authentication Bypass, posing severe threats to organizations worldwide

PoC exploit codes are available for both vulnerabilities

3 months ago

CVE-2024-40725 and CVE-2024-40898 Vulnerabilities in Apache’s HTTP Server : Vulnerability Analysis and Exploitation - CYFIRMA

Published On : 2024-09-11 EXECUTIVE SUMMARY CVE-2024-40725 and CVE-2024-40898 are vulnerabilities in Apache’s HTTP Server. CVE-2024-40725 affects the mod_proxy module, where enabling the ProxyPass...

4 months ago

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by cyfirma

  • 🥇

    Vulnerability reached the number 1 worldwide trending spot

  • 📈

    Vulnerability started trending

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)2 News Article(s)
.