Metrics
Affected Vendors & Products
Tue, 29 Jul 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache http Server
Microsoft Microsoft windows |
|
CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Apache http Server
Microsoft Microsoft windows |
Wed, 16 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
epss
|
Tue, 15 Jul 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
ssvc
|
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Fri, 11 Jul 2025 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|
Thu, 10 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note: The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication. | |
Title | Apache HTTP Server: SSRF on Windows due to UNC paths | |
Weaknesses | CWE-918 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-07-10T16:56:07.720Z
Updated: 2025-07-15T19:56:32.755Z
Reserved: 2024-08-12T14:02:35.969Z
Link: CVE-2024-43394

Updated: 2025-07-11T16:06:27.267Z

Status : Analyzed
Published: 2025-07-10T17:15:46.133
Modified: 2025-07-29T15:15:57.037
Link: CVE-2024-43394
