First published: Thu Sep 16 2021(Updated: )
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.37-76.el8 | 0:2.4.37-76.el8 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-76.jbcs.el7 | 0:2.4.37-76.jbcs.el7 |
redhat/httpd | <0:2.4.6-97.el7_9.1 | 0:2.4.6-97.el7_9.1 |
redhat/httpd | <0:2.4.6-40.el7_2.7 | 0:2.4.6-40.el7_2.7 |
redhat/httpd | <0:2.4.6-45.el7_3.6 | 0:2.4.6-45.el7_3.6 |
redhat/httpd | <0:2.4.6-67.el7_4.7 | 0:2.4.6-67.el7_4.7 |
redhat/httpd | <0:2.4.6-89.el7_6.2 | 0:2.4.6-89.el7_6.2 |
redhat/httpd | <0:2.4.6-90.el7_7.1 | 0:2.4.6-90.el7_7.1 |
redhat/httpd24-httpd | <0:2.4.34-22.el7.1 | 0:2.4.34-22.el7.1 |
debian/apache2 | 2.4.38-3+deb10u8 2.4.38-3+deb10u10 2.4.56-1~deb11u2 2.4.56-1~deb11u1 2.4.57-2 2.4.57-3 2.4.58-1 | |
redhat/httpd | <2.4.49 | 2.4.49 |
Apache HTTP Server | ||
Apache HTTP Server | <=2.4.48 | |
Fedora | =34 | |
Fedora | =35 | |
Debian | =9.0 | |
Debian | =10.0 | |
Debian | =11.0 | |
NetApp Cloud Backup | ||
IBM Data ONTAP | ||
NetApp StorageGrid | ||
F5 F5OS | >=1.1.0<=1.1.4 | |
F5 F5OS | >=1.2.0<=1.2.1 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle Instantis EnterpriseTrack | =17.1 | |
Oracle Instantis EnterpriseTrack | =17.2 | |
Oracle Instantis EnterpriseTrack | =17.3 | |
Tarantella Secure Global Desktop | =5.6 | |
Oracle Storage Cloud Software Appliance | =8.8 | |
Siemens SINEC NMS SP1 Update 1 | ||
Siemens SINEMA Server SP3 | =14.0 | |
Broadcom Fabric Operating System | ||
Siemens Ruggedcom NMS | ||
Siemens SINEC NMS SP1 Update 1 | <1.0.3 | |
Siemens SINEMA Remote Connect | <3.1 | |
Siemens SINEMA Remote Connect | =3.2 | |
Tenable.sc | <=5.19.1 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-40438 is a Server-Side Request Forgery (SSRF) vulnerability found in Apache HTTP Server (httpd) that allows a remote attacker to make the server forward requests to an arbitrary server.
CVE-2021-40438 has a severity level of critical, with a CVSS score of 9.0.
CVE-2021-40438 affects Apache HTTP Server (httpd) versions up to and including 2.4.49.
To fix CVE-2021-40438, upgrade to Apache HTTP Server (httpd) version 2.4.49 or apply the recommended patches provided by your software vendor.
You can find more information about CVE-2021-40438 on the Apache HTTP Server security vulnerabilities page and the Red Hat Bugzilla page.