cve/2024/CVE-2024-40898.md
2025-09-29 16:08:36 +00:00

34 lines
1.5 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-40898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-40898)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.4.0%3C%3D%202.4.61%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-918%20Server-Side%20Request%20Forgery%20(SSRF)&color=brighgreen)
### Description
SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests.Users are recommended to upgrade to version 2.4.62 which fixes this issue. 
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xMarcio/cve
- https://github.com/Andromeda254/cve
- https://github.com/ForceEA001/CVE-2024-40898-SSL-Bypass-Detection
- https://github.com/NeoOniX/5ATTACK
- https://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898
- https://github.com/anilpatel199n/CVE-2024-40898
- https://github.com/dusbot/cpe2cve
- https://github.com/jeanrafaellourenco/shodan-host-recon
- https://github.com/krlabs/apache-vulnerabilities
- https://github.com/lekctut/sdb-hw-13-01
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/pedr0alencar/vlab-metasploitable2
- https://github.com/plzheheplztrying/cve_monitor
- https://github.com/rajeshwarideoraj/Vulnerability_Data_Extraction_and_Analysis
- https://github.com/soltanali0/CVE-2024-40725
- https://github.com/tanjiti/sec_profile
- https://github.com/zulloper/cve-poc