First published: Tue Aug 13 2024(Updated: )
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
F5 BIG-IP and BIG-IQ Centralized Management | >=17.1.0<=17.1.1 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=16.1.0<=16.1.5 | |
F5 BIG-IP and BIG-IQ Centralized Management | >=15.1.0<=15.1.10 | |
F5 F5OS-A | =1.7.0>=1.5.1<=1.5.2 | |
F5 F5OS-C | >=1.6.0<=1.6.2 | |
F5 Traffix Systems Signaling Delivery Controller | =5.2.0=5.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of F5-K000140693 is critical due to the potential for Server-Side Request Forgery (SSRF).
To fix F5-K000140693, upgrade Apache HTTP Server to version 2.4.60 or later.
F5-K000140693 affects Apache HTTP Server versions 2.4.59 and earlier.
F5-K000140693 allows attackers to exploit unsafe RewriteRules leading to unauthorized URL handling.
More details about F5-K000140693 can be found in the advisory from F5.