Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-38475: CWE-116 Improper Encoding or Escaping of Output in Apache Software Foundation Apache HTTP Server

0
Critical
VulnerabilityCVE-2024-38475cvecve-2024-38475cwe-116
Published: Mon Jul 01 2024 (07/01/2024, 18:15:12 UTC)
Source: CVE
Vendor/Project: Apache Software Foundation
Product: Apache HTTP Server

Description

Improper escaping of output in mod_rewrite in Apache HTTP Server 2.4.59 and earlier allows an attacker to map URLs to filesystem locations that are permitted to be served by the server but are not intentionally/directly reachable by any URL, resulting in code execution or source code disclosure. Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected.  Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 04:32:14 UTC

Technical Analysis

CVE-2024-38475 is a critical security vulnerability identified in the Apache HTTP Server, specifically affecting versions 2.4.59 and earlier. The vulnerability stems from improper encoding or escaping of output within the mod_rewrite module, which is responsible for rewriting requested URLs based on defined rules. The flaw occurs when substitutions in the server context use backreferences or variables as the first segment of the substitution path. This improper handling allows an attacker to craft malicious URLs that map to filesystem locations which the server is permitted to serve but are not intended to be directly accessible via any URL. Consequently, attackers can exploit this to execute arbitrary code on the server or disclose sensitive source code files. The vulnerability is classified under CWE-116 (Improper Encoding or Escaping of Output), highlighting the root cause as insufficient sanitization of output paths. The rewrite flag "UnsafePrefixStat" can be used to revert to previous behavior, but only after ensuring that substitutions are properly constrained to prevent exploitation. The vulnerability requires no privileges or user interaction and can be exploited remotely, making it highly dangerous. Although no known exploits have been reported in the wild yet, the high CVSS score of 9.1 underscores the critical nature of this issue. The flaw impacts confidentiality and integrity significantly but does not affect availability. This vulnerability demands immediate attention from organizations using affected Apache HTTP Server versions to prevent potential breaches.

Potential Impact

The impact of CVE-2024-38475 is severe for organizations worldwide relying on Apache HTTP Server 2.4.59 and earlier. Successful exploitation can lead to unauthorized code execution, allowing attackers to run arbitrary commands or scripts on the affected server, potentially leading to full system compromise. Additionally, attackers can access sensitive source code or configuration files that were not intended to be publicly accessible, resulting in confidentiality breaches and aiding further attacks. The vulnerability affects the integrity of the server by enabling unauthorized modifications or injections. Since Apache HTTP Server is widely used to serve web content globally, this vulnerability poses a significant risk to web infrastructure, including corporate websites, government portals, and cloud services. The ease of remote exploitation without authentication increases the threat level, potentially enabling mass exploitation campaigns. Organizations could face data breaches, service disruptions, reputational damage, and regulatory penalties if exploited. The absence of known exploits in the wild currently provides a window for mitigation, but the critical severity demands urgent patching and configuration review to avoid exploitation.

Mitigation Recommendations

To mitigate CVE-2024-38475, organizations should take the following specific actions: 1) Immediately upgrade Apache HTTP Server to the latest version where this vulnerability is patched once available. 2) Review all mod_rewrite rules, especially those using backreferences or variables as the first segment of substitutions, to ensure they do not allow unsafe mappings to sensitive filesystem locations. 3) Use the rewrite flag "UnsafePrefixStat" cautiously only after confirming that substitutions are properly constrained and do not expose unintended paths. 4) Implement strict input validation and sanitization on URLs before they reach the mod_rewrite module to prevent malicious URL crafting. 5) Employ web application firewalls (WAFs) with rules designed to detect and block suspicious rewrite patterns or attempts to access sensitive files. 6) Monitor server logs for unusual rewrite rule triggers or access attempts to non-public filesystem paths. 7) Limit the privileges of the Apache process to minimize the impact of potential code execution. 8) Conduct regular security audits and penetration testing focusing on URL rewriting and filesystem access controls. These targeted steps go beyond generic advice by focusing on the specific rewrite module behavior and configuration nuances that enable this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2024-06-17T11:09:56.096Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec280

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 2/28/2026, 4:32:14 AM

Last updated: 3/24/2026, 9:16:43 PM

Views: 103

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses