SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue.
References
Configurations
History
04 Nov 2025, 22:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
03 Nov 2025, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
29 Jul 2025, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory | |
| CPE | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
| First Time |
Apache
Apache http Server |
15 Jul 2025, 20:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-07-10 17:15
Updated : 2025-11-04 22:16
NVD link : CVE-2024-43204
Mitre link : CVE-2024-43204
CVE.ORG link : CVE-2024-43204
JSON object : View
Products Affected
apache
- http_server
CWE
CWE-918
Server-Side Request Forgery (SSRF)
