vulnerability
Apache HTTPD: Apache HTTP Server: SSRF on Windows due to UNC paths (CVE-2024-43394)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Jul 10, 2025 | Jul 18, 2025 | Nov 6, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Jul 10, 2025
Added
Jul 18, 2025
Modified
Nov 6, 2025
Description
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via
mod_rewrite or apache expressions that pass unvalidated request input.
This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.
Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths.
The server offers limited protection against administrators directing the server to open UNC paths.
Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
mod_rewrite or apache expressions that pass unvalidated request input.
This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.
Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths.
The server offers limited protection against administrators directing the server to open UNC paths.
Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
Solution
apache-httpd-upgrade-latest
References
- URL-http://www.openwall.com/lists/oss-security/2025/07/10/2
- URL-http://www.openwall.com/lists/oss-security/2025/07/10/5
- URL-https://httpd.apache.org/security/vulnerabilities_24.html
- URL-https://lists.debian.org/debian-lts-announce/2025/08/msg00009.html
- CVE-2024-43394
- https://attackerkb.com/topics/CVE-2024-43394
- CWE-918
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.