SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html |
![]() ![]() |
History
Fri, 11 Jul 2025 13:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
epss
|
Thu, 10 Jul 2025 17:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request. Users are recommended to upgrade to version 2.4.64 which fixes this issue. | |
Title | Apache HTTP Server: SSRF with mod_headers setting Content-Type header | |
Weaknesses | CWE-918 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published: 2025-07-10T16:54:15.759Z
Updated: 2025-07-10T16:54:15.759Z
Reserved: 2024-08-08T15:13:29.047Z
Link: CVE-2024-43204

No data.

Status : Received
Published: 2025-07-10T17:15:45.987
Modified: 2025-07-10T17:15:45.987
Link: CVE-2024-43204

No data.