CVE-2024-43394
Severity CVSS v4.0:
Pending analysis
Type:
CWE-918
Server-Side Request Forgery (SSRF)
Publication date:
10/07/2025
Last modified:
29/07/2025
Description
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via <br />
mod_rewrite or apache expressions that pass unvalidated request input.<br />
<br />
This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.<br />
<br />
Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. <br />
<br />
The server offers limited protection against administrators directing the server to open UNC paths.<br />
Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | 2.4.0 (including) | 2.4.64 (excluding) |
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page