First published: Mon Jul 01 2024(Updated: )
SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content. Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing.
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | <2.4.60 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2295011 is high due to the potential for NTLM hash leakage via SSRF.
To fix REDHAT-BUG-2295011, upgrade to Apache HTTP Server version 2.4.60 or later.
REDHAT-BUG-2295011 is a server-side request forgery (SSRF) vulnerability.
All versions of Apache HTTP Server prior to 2.4.60 are affected by REDHAT-BUG-2295011.
When upgrading to fix REDHAT-BUG-2295011, ensure to reconfigure any existing settings that access UNC paths.