First published: Mon Jul 01 2024(Updated: )
Apache HTTP Server could allow a remote attacker to bypass security restrictions, caused by an encoding flaw in mod_proxy. By sending specially crafted requests with incorrect encoding an attacker could exploit this vulnerability to bypass authentication validation.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apache2 | 2.4.62-1~deb11u1 2.4.61-1~deb11u1 2.4.62-1~deb12u1 2.4.62-1~deb12u2 2.4.62-3 | |
IBM Planning Analytics | <=2.1 | |
IBM Planning Analytics | <=2.0 | |
F5 F5OS | =1.7.0>=1.5.1<=1.5.2 | |
F5 F5OS | >=1.6.0<=1.6.2 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38473 has been classified with a high severity due to its potential to allow remote attackers to bypass authentication.
To fix CVE-2024-38473, update your Apache HTTP Server to patched versions 2.4.62-1~deb11u1, 2.4.61-1~deb11u1, or higher.
CVE-2024-38473 affects Apache HTTP Server, IBM Planning Analytics, and various F5 products including F5OS-A and Traffix SDC.
Yes, CVE-2024-38473 can be exploited remotely by attackers sending specially crafted requests.
CVE-2024-38473 can facilitate authentication bypass attacks due to an encoding flaw in mod_proxy.