In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Server-Side Request Forgery (SSRF) vulnerabilities in an interactive lesson.
Start learningUpgrade Debian:unstable
apache2
to version 2.4.64-1 or higher.
Note: Versions mentioned in the description apply only to the upstream apache2
package and not the apache2
package as distributed by Debian
.
See How to fix?
for Debian:unstable
relevant fixed versions and status.
SSRF in Apache HTTP Server with mod_proxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where mod_headers is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue.