SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00017}


Thu, 10 Jul 2025 17:00:00 +0000

Type Values Removed Values Added
Description SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker.  Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue.
Title Apache HTTP Server: SSRF with mod_headers setting Content-Type header
Weaknesses CWE-918
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-07-10T16:54:15.759Z

Updated: 2025-07-10T16:54:15.759Z

Reserved: 2024-08-08T15:13:29.047Z

Link: CVE-2024-43204

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-07-10T17:15:45.987

Modified: 2025-07-10T17:15:45.987

Link: CVE-2024-43204

cve-icon Redhat

No data.