CVE-2024-43204

SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

History

29 Jul 2025, 15:16

Type Values Removed Values Added
First Time Apache http Server
Apache
CPE cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
References () https://httpd.apache.org/security/vulnerabilities_24.html - () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory

15 Jul 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

15 Jul 2025, 13:24

Type Values Removed Values Added
Summary
  • (es) La SSRF en Apache HTTP Server con mod_proxy activado permite a un atacante enviar solicitudes de proxy salientes a una URL controlada por el atacante. Requiere una configuración improbable donde mod_headers se configura para modificar el encabezado de solicitud o respuesta Content-Type con un valor proporcionado en la solicitud HTTP. Se recomienda a los usuarios actualizar a la versión 2.4.64, que soluciona este problema.

10 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 17:15

Updated : 2025-07-29 15:16


NVD link : CVE-2024-43204

Mitre link : CVE-2024-43204

CVE.ORG link : CVE-2024-43204


JSON object : View

Products Affected

apache

  • http_server
CWE
CWE-918

Server-Side Request Forgery (SSRF)