First published: Mon Jul 01 2024(Updated: )
SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | <2.4.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38472 has a high severity rating due to the potential for NTLM hash leakage.
To fix CVE-2024-38472, upgrade to Apache HTTP Server version 2.4.60 or later.
CVE-2024-38472 affects Apache HTTP Server on Windows.
CVE-2024-38472 is a Server-Side Request Forgery (SSRF) vulnerability.
Yes, existing configurations that access UNC paths may be impacted by CVE-2024-38472 after the upgrade.