CVE-2021-40438

Published Sep 16, 2021

Last updated 6 months ago

Overview

Description
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
Source
security@apache.org
NVD status
Analyzed
Products
rocky_linux, jboss_core_services, software_collections, enterprise_linux, enterprise_linux_eus, enterprise_linux_for_arm_64, enterprise_linux_for_arm_64_eus, enterprise_linux_for_ibm_z_systems, enterprise_linux_for_ibm_z_systems_eus, enterprise_linux_for_ibm_z_systems_eus_s390x, enterprise_linux_for_power_big_endian, enterprise_linux_for_power_little_endian, enterprise_linux_for_power_little_endian_eus, enterprise_linux_for_scientific_computing, enterprise_linux_server, enterprise_linux_server_aus, enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions, enterprise_linux_server_tus, enterprise_linux_server_update_services_for_sap_solutions, enterprise_linux_update_services_for_sap_solutions, enterprise_linux_workstation, http_server, fedora, debian_linux, cloud_backup, clustered_data_ontap, storagegrid, brocade_fabric_operating_system_firmware, f5os, enterprise_manager_ops_center, http_server, instantis_enterprisetrack, secure_global_desktop, zfs_storage_appliance_kit, ruggedcom_nms, sinec_nms, sinema_remote_connect_server, sinema_server, tenable.sc

Risk scores

CVSS 3.1

Type
Primary
Base score
9
Impact score
6
Exploitability score
2.2
Vector string
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

CVSS 2.0

Type
Primary
Base score
6.8
Impact score
6.4
Exploitability score
8.6
Vector string
AV:N/AC:M/Au:N/C:P/I:P/A:P

Known exploits

Data from CISA

Vulnerability name
Apache HTTP Server-Side Request Forgery (SSRF)
Exploit added on
Dec 1, 2021
Exploit action due
Dec 15, 2021
Required action
Apply updates per vendor instructions.

Weaknesses

security@apache.org
CWE-918
nvd@nist.gov
CWE-918

Social media

Hype score
Not currently trending

Configurations

References

Sources include official advisories and independent security research.