Metrics
Affected Vendors & Products
Tue, 29 Jul 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Mon, 14 Jul 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Thu, 10 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue. | |
Title | Apache HTTP Server: SSRF with mod_headers setting Content-Type header | |
Weaknesses | CWE-918 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-07-10T16:54:15.759Z
Updated: 2025-07-15T19:56:45.283Z
Reserved: 2024-08-08T15:13:29.047Z
Link: CVE-2024-43204

Updated: 2025-07-11T16:07:00.518Z

Status : Analyzed
Published: 2025-07-10T17:15:45.987
Modified: 2025-07-29T15:16:18.623
Link: CVE-2024-43204
