{"id":"BIT-apache-2024-38476","summary":"Apache HTTP Server may use exploitable/malicious backend application output to run local handlers via internal redirect","details":"Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable.\n\nUsers are recommended to upgrade to version 2.4.60, which fixes this issue.","aliases":["CVE-2024-38476"],"modified":"2025-11-06T13:25:46.476Z","published":"2024-07-03T07:16:44.458Z","database_specific":{"cpes":["cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"],"severity":"Critical"},"references":[{"type":"WEB","url":"https://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20240712-0001/"},{"type":"WEB","url":"http://www.openwall.com/lists/oss-security/2024/07/01/9"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-38476"},{"type":"WEB","url":"http://seclists.org/fulldisclosure/2024/Oct/11"}],"affected":[{"package":{"name":"apache","ecosystem":"Bitnami","purl":"pkg:bitnami/apache"},"ranges":[{"type":"SEMVER","events":[{"introduced":"2.4.0"},{"fixed":"2.4.60"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/apache/BIT-apache-2024-38476.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}],"schema_version":"1.7.3"}