CVE-2024-38472

SSRF in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.60 which fixes this issue.  Note: Existing configurations that access UNC paths will have to configure new directive "UNCList" to allow access during request processing.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*

History

01 Jul 2025, 20:24

Type Values Removed Values Added
CPE cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
First Time Apache
Netapp ontap
Netapp
Apache http Server
References () https://httpd.apache.org/security/vulnerabilities_24.html - () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory
References () http://www.openwall.com/lists/oss-security/2024/07/01/5 - () http://www.openwall.com/lists/oss-security/2024/07/01/5 - Mailing List
References () https://security.netapp.com/advisory/ntap-20240712-0001/ - () https://security.netapp.com/advisory/ntap-20240712-0001/ - Third Party Advisory

Information

Published : 2024-07-01 19:15

Updated : 2025-07-01 20:24


NVD link : CVE-2024-38472

Mitre link : CVE-2024-38472

CVE.ORG link : CVE-2024-38472


JSON object : View

Products Affected

apache

  • http_server

netapp

  • ontap
CWE
CWE-918

Server-Side Request Forgery (SSRF)