Apache Http Server vulnerabilities

299 known vulnerabilities affecting apache/http_server.

Total CVEs
299
CISA KEV
5
actively exploited
Public exploits
66
Exploited in wild
7
Severity breakdown
CRITICAL33HIGH95MEDIUM158LOW13

Vulnerabilities

Page 2 of 15
CVE-2024-38477HIGHCVSS 7.5≥ 2.4.0, < 2.4.602024-07-01
CVE-2024-38477 [HIGH] CWE-476 CVE-2024-38477: null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
nvd
CVE-2024-38472HIGHCVSS 7.5PoC≥ 2.4.0, < 2.4.602024-07-01
CVE-2024-38472 [HIGH] CWE-918 CVE-2024-38472: SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server v SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request proces
nvd
CVE-2024-38473HIGHCVSS 8.1PoC≥ 2.4.0, < 2.4.602024-07-01
CVE-2024-38473 [HIGH] CWE-116 CVE-2024-38473: Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with inco Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
nvd
CVE-2024-39573HIGHCVSS 7.5≥ 2.4.0, < 2.4.602024-07-01
CVE-2024-39573 [HIGH] CWE-20 CVE-2024-39573: Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause u Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
nvd
CVE-2024-36387MEDIUMCVSS 5.4≥ 2.4.55, ≤ 2.4.592024-07-01
CVE-2024-36387 [MEDIUM] CWE-476 CVE-2024-36387: Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer derefere Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
nvd
CVE-2024-27316HIGHCVSS 7.5≥ 2.4.17, < 2.4.592024-04-04
CVE-2024-27316 [HIGH] CWE-770 CVE-2024-27316: HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
nvd
CVE-2023-38709HIGHCVSS 7.3fixed in 2.4.592024-04-04
CVE-2023-38709 [HIGH] CWE-1284 CVE-2023-38709: Faulty input validation in the core of Apache allows malicious or exploitable backend/content genera Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
nvd
CVE-2024-24795MEDIUMCVSS 6.3≥ 2.4.0, < 2.4.592024-04-04
CVE-2024-24795 [MEDIUM] CWE-113 CVE-2024-24795: HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
nvd
CVE-2023-31122HIGHCVSS 7.5fixed in 2.4.582023-10-23
CVE-2023-31122 [HIGH] CWE-125 CVE-2023-31122: Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP S Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
nvd
CVE-2023-43622HIGHCVSS 7.5≥ 2.4.55, < 2.4.582023-10-23
CVE-2023-43622 [HIGH] CWE-400 CVE-2023-43622: An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handlin An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated p
nvd
CVE-2023-45802MEDIUMCVSS 5.9≥ 2.4.17, < 2.4.582023-10-23
CVE-2023-45802 [MEDIUM] CVE-2023-45802: When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's m When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close
nvd
CVE-2023-25690CRITICALCVSS 9.8Exploited≥ 2.4.0, ≤ 2.4.552023-03-07
CVE-2023-25690 [CRITICAL] CWE-444 CVE-2023-25690: Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Reque Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-ins
nvd
CVE-2023-27522HIGHCVSS 7.5≥ 2.4.30, < 2.4.562023-03-07
CVE-2023-27522 [HIGH] CWE-444 CVE-2023-27522: HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.
nvd
CVE-2022-36760CRITICALCVSS 9.0≥ 2.4.0, < 2.4.552023-01-17
CVE-2022-36760 [CRITICAL] CWE-444 CVE-2022-36760: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_a Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
nvd
CVE-2006-20001HIGHCVSS 7.5fixed in 2.4.552023-01-17
CVE-2006-20001 [HIGH] CWE-787 CVE-2006-20001: A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.
nvd
CVE-2022-37436MEDIUMCVSS 5.3fixed in 2.4.552023-01-17
CVE-2022-37436 [MEDIUM] CWE-113 CVE-2022-37436: Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncat Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
nvd
CVE-2022-28615CRITICALCVSS 9.1fixed in 2.4.542022-06-09
CVE-2022-28615 [CRITICAL] CWE-190 CVE-2022-28615: Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
nvd
CVE-2022-31813CRITICALCVSS 9.8fixed in 2.4.542022-06-09
CVE-2022-31813 [CRITICAL] CWE-348 CVE-2022-31813: Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server ba Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
nvd
CVE-2022-29404HIGHCVSS 7.5≤ 2.4.532022-06-09
CVE-2022-29404 [HIGH] CWE-770 CVE-2022-29404: In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
nvd
CVE-2022-30522HIGHCVSS 7.5v2.4.532022-06-09
CVE-2022-30522 [HIGH] CWE-789 CVE-2022-30522: If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
nvd