Bitnami package
apache
pkg:bitnami/apache
Vulnerabilities (82)
| CVE | Sev | CVSS | KEV | Affected versions | Fixed in | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2025-23048 | — | >= 2.4.35, < 2.4.64 | 2.4.64 | Jul 10, 2025 | In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a d | ||
| CVE-2024-43394 | — | >= 2.4.0, < 2.4.64 | 2.4.64 | Jul 10, 2025 | Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note: | ||
| CVE-2024-47252 | — | >= 2.4.0, < 2.4.64 | 2.4.64 | Jul 10, 2025 | Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varna | ||
| CVE-2024-43204 | — | >= 2.4.0, < 2.4.64 | 2.4.64 | Jul 10, 2025 | SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided | ||
| CVE-2024-42516 | — | >= 2.4.0, < 2.4.64 | 2.4.64 | Jul 10, 2025 | HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch include | ||
| CVE-2025-3891 | — | — | — | Apr 29, 2025 | A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availab | ||
| CVE-2024-40725 | — | >= 2.4.60, < 2.4.62 | 2.4.62 | Jul 18, 2024 | A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclo | ||
| CVE-2024-40898 | — | >= 2.4.0, < 2.4.62 | 2.4.62 | Jul 18, 2024 | SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue. | ||
| CVE-2024-39884 | — | >= 2.4.60, < 2.4.61 | 2.4.61 | Jul 4, 2024 | A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local conte | ||
| CVE-2024-39573 | — | >= 2.4.0, < 2.4.60 | 2.4.60 | Jul 1, 2024 | Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue. | ||
| CVE-2024-38477 | — | >= 2.4.0, < 2.4.60 | 2.4.60 | Jul 1, 2024 | null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue. | ||
| CVE-2024-38476 | — | >= 2.4.0, < 2.4.60 | 2.4.60 | Jul 1, 2024 | Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes t | ||
| CVE-2024-38475 | — | KEV | >= 2.4.0, < 2.4.60 | 2.4.60 | Jul 1, 2024 | Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source | |
| CVE-2024-38474 | — | >= 2.4.0, < 2.4.60 | 2.4.60 | Jul 1, 2024 | Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users a | ||
| CVE-2024-38473 | — | >= 2.4.0, < 2.4.60 | 2.4.60 | Jul 1, 2024 | Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue | ||
| CVE-2024-38472 | — | >= 2.4.0, < 2.4.60 | 2.4.60 | Jul 1, 2024 | SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have | ||
| CVE-2024-36387 | — | >= 2.4.55, < 2.4.60 | 2.4.60 | Jul 1, 2024 | Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance. | ||
| CVE-2024-27316 | — | >= 2.4.17, < 2.4.59 | 2.4.59 | Apr 4, 2024 | HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion. | ||
| CVE-2024-24795 | — | >= 2.4.0, < 2.4.59 | 2.4.59 | Apr 4, 2024 | HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue. | ||
| CVE-2023-38709 | — | < 2.4.59 | 2.4.59 | Apr 4, 2024 | Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58. |
- CVE-2025-23048Jul 10, 2025affected >= 2.4.35, < 2.4.64fixed 2.4.64
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a d
- CVE-2024-43394Jul 10, 2025affected >= 2.4.0, < 2.4.64fixed 2.4.64
Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note:
- CVE-2024-47252Jul 10, 2025affected >= 2.4.0, < 2.4.64fixed 2.4.64
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varna
- CVE-2024-43204Jul 10, 2025affected >= 2.4.0, < 2.4.64fixed 2.4.64
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided
- CVE-2024-42516Jul 10, 2025affected >= 2.4.0, < 2.4.64fixed 2.4.64
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch include
- CVE-2025-3891Apr 29, 2025
A flaw was found in the mod_auth_openidc module for Apache httpd. This flaw allows a remote, unauthenticated attacker to trigger a denial of service by sending an empty POST request when the OIDCPreservePost directive is enabled. The server crashes consistently, affecting availab
- CVE-2024-40725Jul 18, 2024affected >= 2.4.60, < 2.4.62fixed 2.4.62
A partial fix for CVE-2024-39884 in the core of Apache HTTP Server 2.4.61 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclo
- CVE-2024-40898Jul 18, 2024affected >= 2.4.0, < 2.4.62fixed 2.4.62
SSRF in Apache HTTP Server on Windows with mod_rewrite in server/vhost context, allows to potentially leak NTML hashes to a malicious server via SSRF and malicious requests. Users are recommended to upgrade to version 2.4.62 which fixes this issue.
- CVE-2024-39884Jul 4, 2024affected >= 2.4.60, < 2.4.61fixed 2.4.61
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local conte
- CVE-2024-39573Jul 1, 2024affected >= 2.4.0, < 2.4.60fixed 2.4.60
Potential SSRF in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to cause unsafe RewriteRules to unexpectedly setup URL's to be handled by mod_proxy. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
- CVE-2024-38477Jul 1, 2024affected >= 2.4.0, < 2.4.60fixed 2.4.60
null pointer dereference in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows an attacker to crash the server via a malicious request. Users are recommended to upgrade to version 2.4.60, which fixes this issue.
- CVE-2024-38476Jul 1, 2024affected >= 2.4.0, < 2.4.60fixed 2.4.60
Vulnerability in core of Apache HTTP Server 2.4.59 and earlier are vulnerably to information disclosure, SSRF or local script execution via backend applications whose response headers are malicious or exploitable. Users are recommended to upgrade to version 2.4.60, which fixes t
- affected >= 2.4.0, < 2.4.60fixed 2.4.60
Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source
- CVE-2024-38474Jul 1, 2024affected >= 2.4.0, < 2.4.60fixed 2.4.60
Substitution encoding issue in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows attacker to execute scripts in directories permitted by the configuration but not directly reachable by any URL or source disclosure of scripts meant to only to be executed as CGI. Users a
- CVE-2024-38473Jul 1, 2024affected >= 2.4.0, < 2.4.60fixed 2.4.60
Encoding problem in mod_proxy in Apache HTTP Server 2.4.59 and earlier allows request URLs with incorrect encoding to be sent to backend services, potentially bypassing authentication via crafted requests. Users are recommended to upgrade to version 2.4.60, which fixes this issue
- CVE-2024-38472Jul 1, 2024affected >= 2.4.0, < 2.4.60fixed 2.4.60
SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue. Note: Existing configurations that access UNC paths will have
- CVE-2024-36387Jul 1, 2024affected >= 2.4.55, < 2.4.60fixed 2.4.60
Serving WebSocket protocol upgrades over a HTTP/2 connection could result in a Null Pointer dereference, leading to a crash of the server process, degrading performance.
- CVE-2024-27316Apr 4, 2024affected >= 2.4.17, < 2.4.59fixed 2.4.59
HTTP/2 incoming headers exceeding the limit are temporarily buffered in nghttp2 in order to generate an informative HTTP 413 response. If a client does not stop sending headers, this leads to memory exhaustion.
- CVE-2024-24795Apr 4, 2024affected >= 2.4.0, < 2.4.59fixed 2.4.59
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
- CVE-2023-38709Apr 4, 2024affected < 2.4.59fixed 2.4.59
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Page 2 of 5