Описание
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 2.4.64-1ubuntu2 |
esm-infra-legacy/trusty | needs-triage | |
esm-infra/bionic | released | 2.4.29-1ubuntu4.27+esm6 |
esm-infra/focal | released | 2.4.41-4ubuntu3.23+esm2 |
esm-infra/xenial | released | 2.4.18-2ubuntu3.17+esm16 |
jammy | released | 2.4.52-1ubuntu4.15 |
noble | released | 2.4.58-1ubuntu8.7 |
plucky | released | 2.4.63-1ubuntu1.1 |
questing | released | 2.4.64-1ubuntu2 |
upstream | released | 2.4.64-1 |
Показывать по
EPSS
7.5 High
CVSS3
Связанные уязвимости
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to ...
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
EPSS
7.5 High
CVSS3