First published: Wed Jul 17 2024(Updated: )
A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.62, which fixes this issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/apache2 | <=2.4.61-1~deb11u1<=2.4.61-1~deb12u1 | 2.4.62-1~deb11u1 2.4.62-1~deb12u1 2.4.62-1 |
Apache Http Server | =2.4.60 | |
Apache Http Server | =2.4.61 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-40725 is considered a medium severity vulnerability affecting Apache HTTP Server.
To mitigate CVE-2024-40725, upgrade to Apache HTTP Server version 2.4.62 or later.
The vulnerable versions for CVE-2024-40725 include Apache HTTP Server 2.4.60 and 2.4.61.
CVE-2024-40725 may lead to source code disclosure under certain configuration circumstances.
Yes, CVE-2024-40725 is a recognized issue linked to a partial fix for an earlier vulnerability.