Search for packages
Package details: pkg:apache/httpd@2.4.12
purl pkg:apache/httpd@2.4.12
Next non-vulnerable version 2.4.42
Latest non-vulnerable version 2.4.54
Risk 10.0
Vulnerabilities affecting this package (33)
Vulnerability Summary Fixed by
VCID-13wj-ajh1-jygx
Aliases:
CVE-2018-1283
In Apache httpd 2.4.0 to 2.4.29, when mod_session is configured to forward its session data to CGI applications (SessionEnv on, not the default), a remote user may influence their content by using a "Session" header. This comes from the "HTTP_SESSION" variable name used by mod_session to forward its data to CGIs, since the prefix "HTTP_" is also used by the Apache HTTP Server to pass HTTP header fields, per CGI specifications.
2.4.33
Affected by 25 other vulnerabilities.
VCID-1az5-fus4-u3fg
Aliases:
CVE-2020-35452
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Digest nonce can cause a stack overflow in mod_auth_digest. There is no report of this overflow being exploitable, nor the Apache HTTP Server team could create one, though some particular compiler and/or compilation option might make it possible, with limited consequences anyway due to the size (a single byte) and the value (zero byte) of the overflow
2.4.48
Affected by 5 other vulnerabilities.
VCID-1deu-fvex-vkhw
Aliases:
CVE-2021-26690
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
2.4.48
Affected by 5 other vulnerabilities.
VCID-2ps4-mxjg-33fd
Aliases:
CVE-2019-10098
Redirects configured with mod_rewrite that were intended to be self-referential might be fooled by encoded newlines and redirect instead to an an unexpected URL within the request URL.
2.4.41
Affected by 9 other vulnerabilities.
VCID-31ng-guzx-8bag
Aliases:
CVE-2015-0228
A stack recursion crash in the mod_lua module was found. A Lua script executing the r:wsupgrade() function could crash the process if a malicious client sent a carefully crafted PING request. This issue affected releases 2.4.7 through 2.4.12 inclusive.
2.4.16
Affected by 29 other vulnerabilities.
VCID-3uab-583c-r3dp
Aliases:
CVE-2021-26691
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted SessionHeader sent by an origin server could cause a heap overflow
2.4.48
Affected by 5 other vulnerabilities.
VCID-4hgn-pxc6-2qh2
Aliases:
CVE-2020-11985
For configurations using proxying with mod_remoteip and certain mod_rewrite rules, an attacker could spoof their IP address for logging and PHP scripts. Note this issue was fixed in Apache HTTP Server 2.4.24 but was retrospectively allocated a low severity CVE in 2020.
2.4.25
Affected by 36 other vulnerabilities.
VCID-5n84-u3mu-nqcg
Aliases:
CVE-2017-3167
Use of the ap_get_basic_auth_pw() by third-party modules outside of the authentication phase may lead to authentication requirements being bypassed. Third-party module writers SHOULD use ap_get_basic_auth_components(), available in 2.2.34 and 2.4.26, instead of ap_get_basic_auth_pw(). Modules which call the legacy ap_get_basic_auth_pw() during the authentication phase MUST either immediately authenticate the user after the call, or else stop the request immediately with an error response, to avoid incorrectly authenticating the current request.
2.4.26
Affected by 32 other vulnerabilities.
VCID-6ak5-ayqx-z3g2
Aliases:
CVE-2017-9788
The value placeholder in [Proxy-]Authorization headers of type 'Digest' was not initialized or reset before or between successive key=value assignments. by mod_auth_digest. Providing an initial key with no '=' assignment could reflect the stale value of uninitialized pool memory used by the prior request, leading to leakage of potentially confidential information, and a segfault.
2.4.27
Affected by 30 other vulnerabilities.
VCID-6q4p-8sra-2qez
Aliases:
CVE-2020-1934
In Apache HTTP Server 2.4.0 to 2.4.41, mod_proxy_ftp may use uninitialized memory when proxying to a malicious FTP server.
2.4.42
Affected by 0 other vulnerabilities.
VCID-7wu7-sdbz-a7ff
Aliases:
CVE-2020-1927
In Apache HTTP Server versions 2.4.0 to 2.4.41 some mod_rewrite configurations vulnerable to open redirect.
2.4.42
Affected by 0 other vulnerabilities.
VCID-9crz-514r-a3e6
Aliases:
CVE-2019-17567
Apache HTTP Server versions 2.4.6 to 2.4.46 mod_proxy_wstunnel configured on an URL that is not necessarily Upgraded by the origin server was tunneling the whole connection regardless, thus allowing for subsequent requests on the same connection to pass through with no HTTP validation, authentication or authorization possibly configured.
2.4.48
Affected by 5 other vulnerabilities.
VCID-9f3y-j6dx-m3aj
Aliases:
CVE-2019-0220
A vulnerability was found in Apache HTTP Server 2.4.0 to 2.4.38. When the path component of a request URL contains multiple consecutive slashes ('/'), directives such as LocationMatch and RewriteRule must account for duplicates in regular expressions while other aspects of the servers processing will implicitly collapse them.
2.4.39
Affected by 16 other vulnerabilities.
VCID-a4z5-u93k-8qe1
Aliases:
CVE-2019-10092
A limited cross-site scripting issue was reported affecting the mod_proxy error page. An attacker could cause the link on the error page to be malfomed and instead point to a page of their choice. This would only be exploitable where a server was set up with proxying enabled but was misconfigured in such a way that the Proxy Error page was displayed. We have taken this opportunity to also remove request data from many other in-built error messages. Note however this issue did not affect them directly and their output was already escaped to prevent cross-site scripting attacks.
2.4.41
Affected by 9 other vulnerabilities.
VCID-auc4-5bkq-8ffa
Aliases:
CVE-2016-0736
Prior to Apache HTTP release 2.4.25, mod_sessioncrypto was encrypting its data/cookie using the configured ciphers with possibly either CBC or ECB modes of operation (AES256-CBC by default), hence no selectable or builtin authenticated encryption. This made it vulnerable to padding oracle attacks, particularly with CBC. An authentication tag (SipHash MAC) is now added to prevent such attacks.
2.4.25
Affected by 36 other vulnerabilities.
VCID-b79v-gjbu-cubt
Aliases:
CVE-2017-15715
The expression specified in <FilesMatch> could match '$' to a newline character in a malicious filename, rather than matching only the end of the filename. This could be exploited in environments where uploads of some files are are externally blocked, but only by matching the trailing portion of the filename.
2.4.33
Affected by 25 other vulnerabilities.
VCID-dvvr-yvra-dqfq
Aliases:
CVE-2017-3169
mod_ssl may dereference a NULL pointer when third-party modules call ap_hook_process_connection() during an HTTP request to an HTTPS port.
2.4.26
Affected by 32 other vulnerabilities.
VCID-ea9w-665t-67cx
Aliases:
CVE-2017-7679
2.4.26
Affected by 32 other vulnerabilities.
VCID-fx6v-uce2-bkbs
Aliases:
CVE-2018-17199
In Apache HTTP Server 2.4 release 2.4.37 and prior, mod_session checks the session expiry time before decoding the session. This causes session expiry time to be ignored for mod_session_cookie sessions since the expiry time is loaded when the session is decoded.
2.4.38
Affected by 22 other vulnerabilities.
VCID-gbmt-u9fv-5fcm
Aliases:
CVE-2018-1312
In Apache httpd 2.2.0 to 2.4.29, when generating an HTTP Digest authentication challenge, the nonce sent to prevent reply attacks was not correctly generated using a pseudo-random seed. In a cluster of servers using a common Digest authentication configuration, HTTP requests could be replayed across servers by an attacker without detection.
2.4.33
Affected by 25 other vulnerabilities.
VCID-gcts-75xq-2bby
Aliases:
CVE-2016-4975
Possible CRLF injection allowing HTTP response splitting attacks for sites which use mod_userdir. This issue was mitigated by changes made in 2.4.25 and 2.2.32 which prohibit CR or LF injection into the "Location" or other outbound header key or value.
2.4.25
Affected by 36 other vulnerabilities.
VCID-gw95-sjjz-p3ad
Aliases:
CVE-2017-9798
2.4.28
Affected by 29 other vulnerabilities.
VCID-h72q-kkmc-23dn
Aliases:
CVE-2020-13938
Apache HTTP Server versions 2.4.0 to 2.4.46 Unprivileged local users can stop httpd on Windows
2.4.48
Affected by 5 other vulnerabilities.
VCID-mu3h-2h54-47fb
Aliases:
CVE-2019-0217
In Apache HTTP Server 2.4 release 2.4.38 and prior, a race condition in mod_auth_digest when running in a threaded server could allow a user with valid credentials to authenticate using another username, bypassing configured access control restrictions.
2.4.39
Affected by 16 other vulnerabilities.
VCID-mu8t-r17h-23gr
Aliases:
CVE-2015-0253
A crash in ErrorDocument handling was found. If ErrorDocument 400 was configured pointing to a local URL-path with the INCLUDES filter active, a NULL dereference would occur when handling the error, causing the child process to crash. This issue affected the 2.4.12 release only.
2.4.16
Affected by 29 other vulnerabilities.
VCID-nj6c-4cty-qkgn
Aliases:
CVE-2015-3185
A design error in the "ap_some_auth_required" function renders the API unusuable in httpd 2.4.x. In particular the API is documented to answering if the request required authentication but only answers if there are Require lines in the applicable configuration. Since 2.4.x Require lines are used for authorization as well and can appear in configurations even when no authentication is required and the request is entirely unrestricted. This could lead to modules using this API to allow access when they should otherwise not do so. API users should use the new ap_some_authn_required API added in 2.4.16 instead.
2.4.16
Affected by 29 other vulnerabilities.
VCID-pme8-jab7-rkbd
Aliases:
CVE-2017-15710
mod_authnz_ldap, if configured with AuthLDAPCharsetConfig, uses the Accept-Language header value to lookup the right charset encoding when verifying the user's credentials. If the header value is not present in the charset conversion table, a fallback mechanism is used to truncate it to a two characters value to allow a quick retry (for example, 'en-US' is truncated to 'en'). A header value of less than two characters forces an out of bound write of one NUL byte to a memory location that is not part of the string. In the worst case, quite unlikely, the process would crash which could be used as a Denial of Service attack. In the more likely case, this memory is already reserved for future use and the issue has no effect at all.
2.4.33
Affected by 25 other vulnerabilities.
VCID-pwwm-mutd-kufn
Aliases:
CVE-2018-1301
A specially crafted request could have crashed the Apache HTTP Server prior to version 2.4.33, due to an out of bound access after a size limit is reached by reading the HTTP header. This vulnerability is considered very hard if not impossible to trigger in non-debug mode (both log and build level), so it is classified as low risk for common server usage.
2.4.33
Affected by 25 other vulnerabilities.
VCID-r2xg-b5uj-gfca
Aliases:
CVE-2018-1303
A specially crafted HTTP request header could have crashed the Apache HTTP Server prior to version 2.4.33 due to an out of bound read while preparing data to be cached in shared memory. It could be used as a Denial of Service attack against users of mod_cache_socache.
2.4.33
Affected by 25 other vulnerabilities.
VCID-ujpu-7jcp-4bbh
Aliases:
CVE-2016-5387
HTTP_PROXY is a well-defined environment variable in a CGI process, which collided with a number of libraries which failed to avoid colliding with this CGI namespace. A mitigation is provided for the httpd CGI environment to avoid populating the "HTTP_PROXY" variable from a "Proxy:" header, which has never been registered by IANA. This workaround and patch are documented in the ASF Advisory at asf-httpoxy-response.txt and incorporated in the 2.4.25 and 2.2.32 releases. Note: This is not assigned an httpd severity, as it is a defect in other software which overloaded well-established CGI environment variables, and does not reflect an error in HTTP server software.
2.4.25
Affected by 36 other vulnerabilities.
VCID-vefs-83s5-8fcv
Aliases:
CVE-2015-3183
An HTTP request smuggling attack was possible due to a bug in parsing of chunked requests. A malicious client could force the server to misinterpret the request length, allowing cache poisoning or credential hijacking if an intermediary proxy is in use.
2.4.16
Affected by 29 other vulnerabilities.
VCID-vfbs-rr54-e7bu
Aliases:
CVE-2016-8743
Apache HTTP Server, prior to release 2.4.25 (and 2.2.32), accepted a broad pattern of unusual whitespace patterns from the user-agent, including bare CR, FF, VTAB in parsing the request line and request header lines, as well as HTAB in parsing the request line. Any bare CR present in request lines was treated as whitespace and remained in the request field member "the_request", while a bare CR in the request header field name would be honored as whitespace, and a bare CR in the request header field value was retained the input headers array. Implied additional whitespace was accepted in the request line and prior to the ':' delimiter of any request header lines. RFC7230 Section 3.5 calls out some of these whitespace exceptions, and section 3.2.3 eliminated and clarified the role of implied whitespace in the grammer of this specification. Section 3.1.1 requires exactly one single SP between the method and request-target, and between the request-target and HTTP-version, followed immediately by a CRLF sequence. None of these fields permit any (unencoded) CTL character whatsoever. Section 3.2.4 explicitly disallowed any whitespace from the request header field prior to the ':' character, while Section 3.2 disallows all CTL characters in the request header line other than the HTAB character as whitespace. These defects represent a security concern when httpd is participating in any chain of proxies or interacting with back-end application servers, either through mod_proxy or using conventional CGI mechanisms. In each case where one agent accepts such CTL characters and does not treat them as whitespace, there is the possiblity in a proxy chain of generating two responses from a server behind the uncautious proxy agent. In a sequence of two requests, this results in request A to the first proxy being interpreted as requests A + A' by the backend server, and if requests A and B were submitted to the first proxy in a keepalive connection, the proxy may interpret response A' as the response to request B, polluting the cache or potentially serving the A' content to a different downstream user-agent. These defects are addressed with the release of Apache HTTP Server 2.4.25 and coordinated by a new directive; HttpProtocolOptions Strict which is the default behavior of 2.4.25 and later. By toggling from 'Strict' behavior to 'Unsafe' behavior, some of the restrictions may be relaxed to allow some invalid HTTP/1.1 clients to communicate with the server, but this will reintroduce the possibility of the problems described in this assessment. Note that relaxing the behavior to 'Unsafe' will still not permit raw CTLs other than HTAB (where permitted), but will allow other RFC requirements to not be enforced, such as exactly two SP characters in the request line.
2.4.25
Affected by 36 other vulnerabilities.
VCID-xyyk-8f6r-vyct
Aliases:
CVE-2016-2161
Malicious input to mod_auth_digest will cause the server to crash, and each instance continues to crash even for subsequently valid requests.
2.4.25
Affected by 36 other vulnerabilities.
Vulnerabilities fixed by this package (4)
Vulnerability Summary Aliases
VCID-252u-ercs-cfeu A NULL pointer deference was found in mod_cache. A malicious HTTP server could cause a crash in a caching forward proxy configuration. This crash would only be a denial of service if using a threaded MPM. CVE-2014-3581
VCID-3tf2-b2tq-k3dr An out-of-bounds memory read was found in mod_proxy_fcgi. A malicious FastCGI server could send a carefully crafted response which could lead to a crash when reading past the end of a heap memory or stack buffer. This issue affects version 2.4.10 only. CVE-2014-3583
VCID-ddvz-xmkg-fkda HTTP trailers could be used to replace HTTP headers late during request processing, potentially undoing or otherwise confusing modules that examined or modified request headers earlier. This fix adds the "MergeTrailers" directive to restore legacy behavior. CVE-2013-5704
VCID-yap9-d5ja-pqfg Fix handling of the Require line in mod_lau when a LuaAuthzProvider is used in multiple Require directives with different arguments. This could lead to different authentication rules than expected. CVE-2014-8109

Date Actor Action Vulnerability Source VulnerableCode Version
2025-07-31T08:29:08.609329+00:00 Apache HTTPD Importer Affected by VCID-3uab-583c-r3dp https://httpd.apache.org/security/json/CVE-2021-26691.json 37.0.0
2025-07-31T08:29:08.441240+00:00 Apache HTTPD Importer Affected by VCID-1deu-fvex-vkhw https://httpd.apache.org/security/json/CVE-2021-26690.json 37.0.0
2025-07-31T08:29:08.258734+00:00 Apache HTTPD Importer Affected by VCID-1az5-fus4-u3fg https://httpd.apache.org/security/json/CVE-2020-35452.json 37.0.0
2025-07-31T08:29:08.033096+00:00 Apache HTTPD Importer Affected by VCID-h72q-kkmc-23dn https://httpd.apache.org/security/json/CVE-2020-13938.json 37.0.0
2025-07-31T08:29:07.828264+00:00 Apache HTTPD Importer Affected by VCID-4hgn-pxc6-2qh2 https://httpd.apache.org/security/json/CVE-2020-11985.json 37.0.0
2025-07-31T08:29:07.490915+00:00 Apache HTTPD Importer Affected by VCID-6q4p-8sra-2qez https://httpd.apache.org/security/json/CVE-2020-1934.json 37.0.0
2025-07-31T08:29:07.309427+00:00 Apache HTTPD Importer Affected by VCID-7wu7-sdbz-a7ff https://httpd.apache.org/security/json/CVE-2020-1927.json 37.0.0
2025-07-31T08:29:07.128000+00:00 Apache HTTPD Importer Affected by VCID-9crz-514r-a3e6 https://httpd.apache.org/security/json/CVE-2019-17567.json 37.0.0
2025-07-31T08:29:06.981474+00:00 Apache HTTPD Importer Affected by VCID-2ps4-mxjg-33fd https://httpd.apache.org/security/json/CVE-2019-10098.json 37.0.0
2025-07-31T08:29:06.753702+00:00 Apache HTTPD Importer Affected by VCID-a4z5-u93k-8qe1 https://httpd.apache.org/security/json/CVE-2019-10092.json 37.0.0
2025-07-31T08:29:06.298110+00:00 Apache HTTPD Importer Affected by VCID-9f3y-j6dx-m3aj https://httpd.apache.org/security/json/CVE-2019-0220.json 37.0.0
2025-07-31T08:29:06.145932+00:00 Apache HTTPD Importer Affected by VCID-mu3h-2h54-47fb https://httpd.apache.org/security/json/CVE-2019-0217.json 37.0.0
2025-07-31T08:29:05.676476+00:00 Apache HTTPD Importer Affected by VCID-fx6v-uce2-bkbs https://httpd.apache.org/security/json/CVE-2018-17199.json 37.0.0
2025-07-31T08:29:05.246419+00:00 Apache HTTPD Importer Affected by VCID-gbmt-u9fv-5fcm https://httpd.apache.org/security/json/CVE-2018-1312.json 37.0.0
2025-07-31T08:29:05.131294+00:00 Apache HTTPD Importer Affected by VCID-r2xg-b5uj-gfca https://httpd.apache.org/security/json/CVE-2018-1303.json 37.0.0
2025-07-31T08:29:04.959809+00:00 Apache HTTPD Importer Affected by VCID-pwwm-mutd-kufn https://httpd.apache.org/security/json/CVE-2018-1301.json 37.0.0
2025-07-31T08:29:04.839814+00:00 Apache HTTPD Importer Affected by VCID-13wj-ajh1-jygx https://httpd.apache.org/security/json/CVE-2018-1283.json 37.0.0
2025-07-31T08:29:04.715961+00:00 Apache HTTPD Importer Affected by VCID-b79v-gjbu-cubt https://httpd.apache.org/security/json/CVE-2017-15715.json 37.0.0
2025-07-31T08:29:04.589322+00:00 Apache HTTPD Importer Affected by VCID-pme8-jab7-rkbd https://httpd.apache.org/security/json/CVE-2017-15710.json 37.0.0
2025-07-31T08:29:04.470828+00:00 Apache HTTPD Importer Affected by VCID-gw95-sjjz-p3ad https://httpd.apache.org/security/json/CVE-2017-9798.json 37.0.0
2025-07-31T08:29:03.992208+00:00 Apache HTTPD Importer Affected by VCID-6ak5-ayqx-z3g2 https://httpd.apache.org/security/json/CVE-2017-9788.json 37.0.0
2025-07-31T08:29:03.572664+00:00 Apache HTTPD Importer Affected by VCID-ea9w-665t-67cx https://httpd.apache.org/security/json/CVE-2017-7679.json 37.0.0
2025-07-31T08:29:03.087679+00:00 Apache HTTPD Importer Affected by VCID-dvvr-yvra-dqfq https://httpd.apache.org/security/json/CVE-2017-3169.json 37.0.0
2025-07-31T08:29:02.664320+00:00 Apache HTTPD Importer Affected by VCID-5n84-u3mu-nqcg https://httpd.apache.org/security/json/CVE-2017-3167.json 37.0.0
2025-07-31T08:29:02.262339+00:00 Apache HTTPD Importer Affected by VCID-vfbs-rr54-e7bu https://httpd.apache.org/security/json/CVE-2016-8743.json 37.0.0
2025-07-31T08:29:01.821800+00:00 Apache HTTPD Importer Affected by VCID-ujpu-7jcp-4bbh https://httpd.apache.org/security/json/CVE-2016-5387.json 37.0.0
2025-07-31T08:29:01.397862+00:00 Apache HTTPD Importer Affected by VCID-gcts-75xq-2bby https://httpd.apache.org/security/json/CVE-2016-4975.json 37.0.0
2025-07-31T08:29:01.167287+00:00 Apache HTTPD Importer Affected by VCID-xyyk-8f6r-vyct https://httpd.apache.org/security/json/CVE-2016-2161.json 37.0.0
2025-07-31T08:29:01.034199+00:00 Apache HTTPD Importer Affected by VCID-auc4-5bkq-8ffa https://httpd.apache.org/security/json/CVE-2016-0736.json 37.0.0
2025-07-31T08:29:00.964971+00:00 Apache HTTPD Importer Affected by VCID-nj6c-4cty-qkgn https://httpd.apache.org/security/json/CVE-2015-3185.json 37.0.0
2025-07-31T08:29:00.748254+00:00 Apache HTTPD Importer Affected by VCID-vefs-83s5-8fcv https://httpd.apache.org/security/json/CVE-2015-3183.json 37.0.0
2025-07-31T08:29:00.545914+00:00 Apache HTTPD Importer Affected by VCID-mu8t-r17h-23gr https://httpd.apache.org/security/json/CVE-2015-0253.json 37.0.0
2025-07-31T08:29:00.516370+00:00 Apache HTTPD Importer Affected by VCID-31ng-guzx-8bag https://httpd.apache.org/security/json/CVE-2015-0228.json 37.0.0
2025-07-31T08:29:00.475950+00:00 Apache HTTPD Importer Fixing VCID-yap9-d5ja-pqfg https://httpd.apache.org/security/json/CVE-2014-8109.json 37.0.0
2025-07-31T08:29:00.414081+00:00 Apache HTTPD Importer Fixing VCID-3tf2-b2tq-k3dr https://httpd.apache.org/security/json/CVE-2014-3583.json 37.0.0
2025-07-31T08:29:00.385367+00:00 Apache HTTPD Importer Fixing VCID-252u-ercs-cfeu https://httpd.apache.org/security/json/CVE-2014-3581.json 37.0.0
2025-07-31T08:28:58.623647+00:00 Apache HTTPD Importer Fixing VCID-ddvz-xmkg-fkda https://httpd.apache.org/security/json/CVE-2013-5704.json 37.0.0