cve/2024/CVE-2024-38474.md
2025-09-29 16:08:36 +00:00

26 lines
1.4 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-38474](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38474)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.4.0%3C%3D%202.4.59%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-116%20Improper%20Encoding%20or%20Escaping%20of%20Output&color=brighgreen)
### Description
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts indirectories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.Users are recommended to upgrade to version 2.4.60, which fixes this issue.Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/GhostTroops/TOP
- https://github.com/NeoOniX/5ATTACK
- https://github.com/Y09a514/Test-Apache-Vulnerability
- https://github.com/dusbot/cpe2cve
- https://github.com/ere6u5/-containerization-security-assessment-
- https://github.com/krlabs/apache-vulnerabilities
- https://github.com/mimishak-um/Vulnerability-Scanner
- https://github.com/minektur/rhel8-cve-eratta-checker
- https://github.com/mrmtwoj/apache-vulnerability-testing