Apache Software Foundation Apache Http Server vulnerabilities

96 known vulnerabilities affecting apache_software_foundation/apache_http_server.

Total CVEs
96
CISA KEV
5
actively exploited
Public exploits
14
Exploited in wild
6
Severity breakdown
CRITICAL22HIGH52MEDIUM22

Vulnerabilities

Page 2 of 5
CVE-2024-38477HIGHCVSS 7.5≥ 2.4.0, ≤ 2.4.592024-07-01
CVE-2024-38477 [HIGH] CWE-476 CVE-2024-38477: null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
cvelistv5nvd
CVE-2024-38472HIGHCVSS 7.5PoC≥ 2.4.0, ≤ 2.4.592024-07-01
CVE-2024-38472 [HIGH] CWE-918 CVE-2024-38472: SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server v SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request proces
cvelistv5nvd
CVE-2024-38473HIGHCVSS 8.1PoC≥ 2.4.0, ≤ 2.4.592024-07-01
CVE-2024-38473 [HIGH] CWE-116 CVE-2024-38473: Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with inco Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
cvelistv5nvd
CVE-2024-39573HIGHCVSS 7.5≥ 2.4.0, ≤ 2.4.592024-07-01
CVE-2024-39573 [HIGH] CWE-20 CVE-2024-39573: Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause u Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
cvelistv5nvd
CVE-2024-36387MEDIUMCVSS 5.4≥ 2.4.55, ≤ 2.4.592024-07-01
CVE-2024-36387 [MEDIUM] CWE-476 CVE-2024-36387: Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer derefere Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
cvelistv5nvd
CVE-2023-38709HIGHCVSS 7.3≥ 2.4.0, ≤ 2.4.632024-04-04
CVE-2023-38709 [HIGH] CWE-1284 CVE-2023-38709: Faulty input validation in the core of Apache allows malicious or exploitable backend/content genera Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
cvelistv5nvd
CVE-2024-27316HIGHCVSS 7.5≥ 2.4.17, ≤ 2.4.582024-04-04
CVE-2024-27316 [HIGH] CWE-770 CVE-2024-27316: HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
cvelistv5nvd
CVE-2024-24795MEDIUMCVSS 6.3≥ 2.4.0, ≤ 2.4.582024-04-04
CVE-2024-24795 [MEDIUM] CWE-113 CVE-2024-24795: HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
cvelistv5nvd
CVE-2023-31122HIGHCVSS 7.5≤ 2.4.572023-10-23
CVE-2023-31122 [HIGH] CWE-125 CVE-2023-31122: Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP S Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
cvelistv5nvd
CVE-2023-43622HIGHCVSS 7.5≥ 2.4.55, ≤ 2.4.572023-10-23
CVE-2023-43622 [HIGH] CWE-400 CVE-2023-43622: An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handlin An attacker, opening a HTTP/2 connection with an initial window size of 0, was able to block handling of that connection indefinitely in Apache HTTP Server. This could be used to exhaust worker resources in the server, similar to the well known "slow loris" attack pattern. This has been fixed in version 2.4.58, so that such connection are terminated p
cvelistv5nvd
CVE-2023-45802HIGHCVSS 7.5≥ 2.4.17, ≤ 2.4.572023-10-23
CVE-2023-45802 [HIGH] CWE-404 Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST Apache HTTP Server: HTTP/2 stream memory not reclaimed right away on RST When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to
cvelistv5
CVE-2023-44487HIGHCVSS 7.5KEVPoC≥ 2.4.17, ≤ 2.4.572023-10-10
CVE-2023-44487 [HIGH] CWE-400 CVE-2023-44487: The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancell The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
nvd
CVE-2023-25690CRITICALCVSS 9.8Exploited≥ 2.4.0, ≤ 2.4.552023-03-07
CVE-2023-25690 [CRITICAL] CWE-444 CVE-2023-25690: Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Reque Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-ins
cvelistv5nvd
CVE-2023-27522HIGHCVSS 7.5≥ 2.4.30, ≤ 2.4.552023-03-07
CVE-2023-27522 [HIGH] CWE-444 CVE-2023-27522: HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.
cvelistv5nvd
CVE-2022-36760CRITICALCVSS 9.0≥ 2.4, ≤ 2.4.542023-01-17
CVE-2022-36760 [CRITICAL] CWE-444 CVE-2022-36760: Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_a Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
cvelistv5nvd
CVE-2006-20001HIGHCVSS 7.5≥ 2.4, ≤ 2.4.542023-01-17
CVE-2006-20001 [HIGH] CWE-787 CVE-2006-20001: A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.
cvelistv5nvd
CVE-2022-37436MEDIUMCVSS 5.3fixed in 2.4.552023-01-17
CVE-2022-37436 [MEDIUM] CWE-113 CVE-2022-37436: Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncat Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
cvelistv5nvd
CVE-2022-28615CRITICALCVSS 9.1≥ Apache HTTP Server, ≤ 2.4.532022-06-09
CVE-2022-28615 [CRITICAL] CWE-190 CVE-2022-28615: Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
cvelistv5nvd
CVE-2022-31813CRITICALCVSS 9.8≥ Apache HTTP Server 2.4, ≤ 2.4.532022-06-09
CVE-2022-31813 [CRITICAL] CWE-348 CVE-2022-31813: Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server ba Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
cvelistv5nvd
CVE-2022-30556HIGHCVSS 7.5≥ unspecified, ≤ 2.4.532022-06-09
CVE-2022-30556 [HIGH] CWE-200 CVE-2022-30556: Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that poi Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
cvelistv5nvd