First published: Thu Sep 16 2021(Updated: )
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.37-76.el8 | 0:2.4.37-76.el8 |
redhat/jbcs-httpd24-httpd | <0:2.4.37-76.jbcs.el7 | 0:2.4.37-76.jbcs.el7 |
redhat/httpd | <0:2.4.6-97.el7_9.1 | 0:2.4.6-97.el7_9.1 |
redhat/httpd | <0:2.4.6-40.el7_2.7 | 0:2.4.6-40.el7_2.7 |
redhat/httpd | <0:2.4.6-45.el7_3.6 | 0:2.4.6-45.el7_3.6 |
redhat/httpd | <0:2.4.6-67.el7_4.7 | 0:2.4.6-67.el7_4.7 |
redhat/httpd | <0:2.4.6-89.el7_6.2 | 0:2.4.6-89.el7_6.2 |
redhat/httpd | <0:2.4.6-90.el7_7.1 | 0:2.4.6-90.el7_7.1 |
redhat/httpd24-httpd | <0:2.4.34-22.el7.1 | 0:2.4.34-22.el7.1 |
debian/apache2 | 2.4.38-3+deb10u8 2.4.38-3+deb10u10 2.4.56-1~deb11u2 2.4.56-1~deb11u1 2.4.57-2 2.4.57-3 2.4.58-1 | |
Apache HTTP server | <=2.4.48 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Netapp Cloud Backup | ||
NetApp Clustered Data ONTAP | ||
Netapp Storagegrid | ||
F5 F5os | >=1.1.0<=1.1.4 | |
F5 F5os | >=1.2.0<=1.2.1 | |
Oracle Enterprise Manager Ops Center | =12.4.0.0 | |
Oracle HTTP Server | =12.2.1.3.0 | |
Oracle HTTP Server | =12.2.1.4.0 | |
Oracle Instantis Enterprisetrack | =17.1 | |
Oracle Instantis Enterprisetrack | =17.2 | |
Oracle Instantis Enterprisetrack | =17.3 | |
Oracle Secure Global Desktop | =5.6 | |
Oracle ZFS Storage Appliance Kit | =8.8 | |
Siemens SINEC NMS | ||
Siemens SINEMA Server | =14.0 | |
Broadcom Brocade Fabric Operating System Firmware | ||
Siemens Ruggedcom Nms | ||
Siemens SINEC NMS | <1.0.3 | |
Siemens SINEMA Remote Connect Server | <3.1 | |
Siemens SINEMA Remote Connect Server | =3.2 | |
Tenable Tenable.sc | <=5.19.1 | |
redhat/httpd | <2.4.49 | 2.4.49 |
Apache Apache | ||
<=2.4.48 | ||
=34 | ||
=35 | ||
=9.0 | ||
=10.0 | ||
=11.0 | ||
>=1.1.0<=1.1.4 | ||
>=1.2.0<=1.2.1 | ||
=12.4.0.0 | ||
=12.2.1.3.0 | ||
=12.2.1.4.0 | ||
=17.1 | ||
=17.2 | ||
=17.3 | ||
=5.6 | ||
=8.8 | ||
<1.0.3 | ||
<3.1 | ||
=3.2 | ||
=14.0 | ||
<=5.19.1 |
Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update the affected package as soon as possible.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-40438 is a Server-Side Request Forgery (SSRF) vulnerability found in Apache HTTP Server (httpd) that allows a remote attacker to make the server forward requests to an arbitrary server.
CVE-2021-40438 has a severity level of critical, with a CVSS score of 9.0.
CVE-2021-40438 affects Apache HTTP Server (httpd) versions up to and including 2.4.49.
To fix CVE-2021-40438, upgrade to Apache HTTP Server (httpd) version 2.4.49 or apply the recommended patches provided by your software vendor.
You can find more information about CVE-2021-40438 on the Apache HTTP Server security vulnerabilities page and the Red Hat Bugzilla page.