CVE-2021-40438 - Server-Side Request Forgery (SSRF)

Severity

98%

Complexity

39%

Confidentiality

98%

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

CVSS 3.1 Base Score 9.8. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).

CVSS 2.0 Base Score 7.5. CVSS Attack Vector: network. CVSS Attack Complexity: low. CVSS Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P).

CVSS 3.1 Base Score 9. CVSS Attack Vector: network. CVSS Attack Complexity: high. CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).

CVSS 2.0 Base Score 6.8. CVSS Attack Vector: network. CVSS Attack Complexity: medium. CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:P/A:P).

Overview

First reported 3 years ago

2021-09-16 15:15:00

Last updated 3 years ago

2021-11-29 17:20:00

Affected Software

Apache Software Foundation Apache HTTP Server

Debian Linux 9.0

9.0

References

https://httpd.apache.org/security/vulnerabilities_24.html

FEDORA-2021-dce7e7738e

[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info

[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info

[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

FEDORA-2021-e3f6dd670d

https://httpd.apache.org/security/vulnerabilities_24.html

Release Notes, Vendor Advisory

FEDORA-2021-dce7e7738e

Mailing List, Third Party Advisory

[httpd-users] 20210923 Re: [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

[httpd-users] 20210923 [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

[httpd-users] 20210923 [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

[httpd-users] 20210923 Re: [users@httpd] Re: [External] : [users@httpd] 2.4.49 security fixes: more info

Mailing List, Vendor Advisory

FEDORA-2021-e3f6dd670d

Mailing List, Third Party Advisory

[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update

[debian-lts-announce] 20211002 [SECURITY] [DLA 2776-1] apache2 security update

Mailing List, Third Party Advisory

https://security.netapp.com/advisory/ntap-20211008-0004/

[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression

DSA-4982

[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438

[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438

https://www.tenable.com/security/tns-2021-17

https://security.netapp.com/advisory/ntap-20211008-0004/

Third Party Advisory

[httpd-bugs] 20211008 [Bug 65616] CVE-2021-36160 regression

Mailing List, Vendor Advisory

DSA-4982

Third Party Advisory

[httpd-users] 20211019 [users@httpd] Regarding CVE-2021-40438

Mailing List, Vendor Advisory

[httpd-users] 20211019 Re: [users@httpd] Regarding CVE-2021-40438

Mailing List, Vendor Advisory

https://www.tenable.com/security/tns-2021-17

Third Party Advisory

20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021

20211124 Multiple Vulnerabilities in Apache HTTP Server Affecting Cisco Products: November 2021

Third Party Advisory

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.