Search for vulnerabilities
| Vulnerability ID | VCID-yte9-8u8p-qqh3 |
| Aliases |
CVE-2011-4317
|
| Summary | An additional exposure was found when using mod_proxy in reverse proxy mode. In certain configurations using RewriteRule with proxy flag or ProxyPassMatch, a remote attacker could cause the reverse proxy to connect to an arbitrary server, possibly disclosing sensitive information from internal web servers not directly accessible to attacker. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 4.8 |
| Risk | 9.6 |
| Affected and Fixed Packages | Package Details |
| There are no known CWE. |
| System | Score | Found at |
|---|---|---|
| epss | 0.83583 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| epss | 0.88879 | https://api.first.org/data/v1/epss?cve=CVE-2011-4317 |
| apache_httpd | moderate | https://httpd.apache.org/security/json/CVE-2011-4317.json |
| Reference id | Reference type | URL |
|---|---|---|
| https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2011-4317.json | ||
| https://api.first.org/data/v1/epss?cve=CVE-2011-4317 | ||
| https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-4317 | ||
| 756483 | https://bugzilla.redhat.com/show_bug.cgi?id=756483 | |
| CVE-2011-4317 | https://httpd.apache.org/security/json/CVE-2011-4317.json | |
| CVE-2011-4317;OSVDB-77310 | Exploit | https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/remote/36352.txt |
| CVE-2011-4317;OSVDB-77310 | Exploit | https://www.securityfocus.com/bid/50802/info |
| RHSA-2012:0128 | https://access.redhat.com/errata/RHSA-2012:0128 | |
| USN-1368-1 | https://usn.ubuntu.com/1368-1/ |
| Data source | Exploit-DB |
|---|---|
| Date added | Nov. 24, 2011 |
| Description | Apache 7.0.x mod_proxy - Reverse Proxy Security Bypass |
| Ransomware campaign use | Known |
| Source publication date | Nov. 24, 2011 |
| Exploit type | remote |
| Platform | linux |
| Source update date | Jan. 31, 2017 |
| Source URL | https://www.securityfocus.com/bid/50802/info |
| Percentile | 0.99249 |
| EPSS Score | 0.83583 |
| Published At | Aug. 3, 2025, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2025-07-31T08:28:55.424939+00:00 | Apache HTTPD Importer | Import | https://httpd.apache.org/security/json/CVE-2011-4317.json | 37.0.0 |