First published: Mon Jul 01 2024(Updated: )
Apache HTTP Server could allow a remote attacker to execute arbitrary code on the system, caused by a substitution encoding issue in mod_rewrite. By sending a specially crafted request, an attacker could exploit this vulnerability to execute scripts in directories permitted by the configuration.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apache2 | 2.4.62-1~deb11u1 2.4.61-1~deb11u1 2.4.62-1~deb12u1 2.4.62-1~deb12u2 2.4.62-3 | |
IBM Planning Analytics | <=2.1 | |
IBM Planning Analytics | <=2.0 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 | |
Apache Http Server | >=2.4.0<2.4.60 | |
IBM Data ONTAP | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-38474 is rated as a critical vulnerability due to its potential to allow remote code execution.
To fix CVE-2024-38474, upgrade to the patched versions of affected Apache HTTP Server packages as specified by your vendor.
CVE-2024-38474 affects Apache HTTP Server versions prior to 2.4.62 as well as certain versions of IBM Planning Analytics and F5 BIG-IP.
Yes, CVE-2024-38474 can be exploited remotely by sending specially crafted requests to vulnerable servers.
Yes, proof-of-concept exploits for CVE-2024-38474 have been demonstrated, increasing the urgency of applying security updates.