Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2024-38475
HistoryJul 01, 2024 - 7:15 p.m.

CVE-2024-38475

2024-07-0119:15:04
Debian Security Bug Tracker
security-tracker.debian.org
30
apache http server
mod_rewrite
code execution
source code disclosure
unsafe rewriterules

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.2%

Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that areย permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions inย server context that use a backreferences or variables as the first segment of the substitution are affected.ย  Some unsafe RewiteRules will be broken by this change and the rewrite flag โ€œUnsafePrefixStatโ€ can be used to opt back in once ensuring the substitution is appropriately constrained.

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

6.9

Confidence

High

EPSS

0

Percentile

9.2%