CVE-2024-38475

Updated: 2025-11-19 03:29:47.901647

Description:

Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x CRITICAL 9.1

Known exploits

Added Date Description Due Date Notes
2025-05-01 Apache HTTP Server contains an improper escaping of output vulnerability in mod_rewrite that allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. 2025-05-22 This vulnerability affects a common open-source component, third-party library, or a protocol used by different products. Please check with specific vendors for information on patching status. For more information, please see: https://httpd.apache.org/security/vulnerabilities_24.html ; https://nvd.nist.gov/vuln/detail/CVE-2024-38475

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

Oracle Linux 7 ELS httpd 2.4.6 9.1 CRITICAL Already Fixed 2024-12-09 11:55:22
RHEL 7 ELS httpd 2.4.6 9.1 CRITICAL Already Fixed 2025-11-17 14:53:52
Ubuntu 16.04 ELS apache2 2.4.18 9.1 CRITICAL Released CLSA-2024:1725012024 2024-08-30 12:14:35
Ubuntu 18.04 ELS apache2 2.4.29 9.1 CRITICAL Released CLSA-2024:1724788546 2024-08-27 17:27:22
Total: 14