Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via 
mod_rewrite or apache expressions that pass unvalidated request input.

This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63.

Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths.

The server offers limited protection against administrators directing the server to open UNC paths.
Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-4270-1 apache2 security update
EUVD EUVD EUVD-2024-54772 Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 05 Nov 2025 07:30:00 +0900


Tue, 04 Nov 2025 05:30:00 +0900

Type Values Removed Values Added
References

Wed, 30 Jul 2025 00:30:00 +0900

Type Values Removed Values Added
First Time appeared Apache http Server
Microsoft
Microsoft windows
CPEs cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*
Vendors & Products Apache http Server
Microsoft
Microsoft windows

Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00029}

epss

{'score': 0.0006}


Wed, 16 Jul 2025 05:15:00 +0900

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Fri, 11 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.00029}


Fri, 11 Jul 2025 09:15:00 +0900

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}

epss

{}

threat_severity

Moderate


Fri, 11 Jul 2025 02:00:00 +0900

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) in Apache HTTP Server on Windows allows to potentially leak NTLM hashes to a malicious server via  mod_rewrite or apache expressions that pass unvalidated request input. This issue affects Apache HTTP Server: from 2.4.0 through 2.4.63. Note:  The Apache HTTP Server Project will be setting a higher bar for accepting vulnerability reports regarding SSRF via UNC paths. The server offers limited protection against administrators directing the server to open UNC paths. Windows servers should limit the hosts they will connect over via SMB based on the nature of NTLM authentication.
Title Apache HTTP Server: SSRF on Windows due to UNC paths
Weaknesses CWE-918
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-11-04T21:08:53.876Z

Reserved: 2024-08-12T14:02:35.969Z

Link: CVE-2024-43394

cve-icon Vulnrichment

Updated: 2025-11-04T21:08:53.876Z

cve-icon NVD

Status : Modified

Published: 2025-07-10T17:15:46.133

Modified: 2025-11-04T22:16:03.600

Link: CVE-2024-43394

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-07-10T16:56:07Z

Links: CVE-2024-43394 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-07-13T20:23:05Z

Weaknesses