Unrated severityNVD Advisory· Published Jul 1, 2024· Updated Mar 25, 2025
Apache HTTP Server weakness with encoded question marks in backreferences
CVE-2024-38474
Description
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI.
Users are recommended to upgrade to version 2.4.60, which fixes this issue.
Some RewriteRules that capture and substitute unsafely will now fail unless rewrite flag "UnsafeAllow3F" is specified.
Affected products
54- osv-coords53 versionspkg:bitnami/apachepkg:rpm/almalinux/httpdpkg:rpm/almalinux/httpd-corepkg:rpm/almalinux/httpd-develpkg:rpm/almalinux/httpd-filesystempkg:rpm/almalinux/httpd-manualpkg:rpm/almalinux/httpd-toolspkg:rpm/almalinux/mod_http2pkg:rpm/almalinux/mod_ldappkg:rpm/almalinux/mod_luapkg:rpm/almalinux/mod_mdpkg:rpm/almalinux/mod_proxy_htmlpkg:rpm/almalinux/mod_sessionpkg:rpm/almalinux/mod_sslpkg:rpm/opensuse/apache2-devel&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/apache2&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/apache2-event&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-manual&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-prefork&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-utils&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-worker&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/apache2-devel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/apache2&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/apache2-event&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/apache2-prefork&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/apache2-utils&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/apache2-worker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6
>= 2.4.0, < 2.4.60+ 52 more
- (no CPE)range: >= 2.4.0, < 2.4.60
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 2.4.57-11.el9_4
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 1.15.7-10.module_el8.10.0+3832+564e7653
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 2.4.57-11.el9_4
- (no CPE)range: < 1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
- (no CPE)range: < 1:2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 1:2.4.37-65.module_el8.10.0+3872+9b8ab21e.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.61-1.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.51-150200.3.73.1
- (no CPE)range: < 2.4.51-150200.3.73.1
- (no CPE)range: < 2.4.51-150200.3.73.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.51-35.57.1
- (no CPE)range: < 2.4.51-150200.3.73.1
- (no CPE)range: < 2.4.51-150200.3.73.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.51-35.57.1
- (no CPE)range: < 2.4.51-150200.3.73.1
- (no CPE)range: < 2.4.51-150200.3.73.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.51-35.57.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.51-150400.6.34.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.51-35.57.2
- (no CPE)range: < 2.4.51-35.57.2
- (no CPE)range: < 2.4.51-35.57.2
- (no CPE)range: < 2.4.58-150600.5.23.1
- (no CPE)range: < 2.4.58-150600.5.23.1
- Apache Software Foundation/Apache HTTP Serverv5Range: 2.4.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- httpd.apache.org/security/vulnerabilities_24.htmlmitrevendor-advisory
- security.netapp.com/advisory/ntap-20240712-0001/mitre
News mentions
0No linked articles in our index yet.