CVE Vulnerabilities

CVE-2021-40438

Server-Side Request Forgery (SSRF)

Published: Sep 16, 2021 | Modified: Oct 27, 2025
CVSS 3.x
9
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CVSS 2.x
6.8 MEDIUM
AV:N/AC:M/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
9 IMPORTANT
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.

Weakness

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.

Affected Software

NameVendorStart VersionEnd Version
Rocky_linuxResf8.0 (including)8.0 (including)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-httpd-0:2.4.37-76.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_http2-0:1.15.7-19.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_md-1:2.0.8-38.el8jbcs*
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-mod_security-0:2.9.2-65.GA.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.37-76.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_cluster-native-0:1.3.16-7.Final_redhat_2.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_http2-0:1.15.7-19.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_jk-0:1.2.48-18.redhat_1.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_md-1:2.0.8-38.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.2-65.GA.jbcs.el7*
Red Hat Enterprise Linux 7RedHathttpd-0:2.4.6-97.el7_9.1*
Red Hat Enterprise Linux 7.2 Advanced Update SupportRedHathttpd-0:2.4.6-40.el7_2.7*
Red Hat Enterprise Linux 7.3 Advanced Update SupportRedHathttpd-0:2.4.6-45.el7_3.6*
Red Hat Enterprise Linux 7.4 Advanced Update SupportRedHathttpd-0:2.4.6-67.el7_4.7*
Red Hat Enterprise Linux 7.6 Advanced Update Support(Disable again in 2026 - SPRHEL-7118)RedHathttpd-0:2.4.6-89.el7_6.2*
Red Hat Enterprise Linux 7.6 Telco Extended Update SupportRedHathttpd-0:2.4.6-89.el7_6.2*
Red Hat Enterprise Linux 7.6 Update Services for SAP SolutionsRedHathttpd-0:2.4.6-89.el7_6.2*
Red Hat Enterprise Linux 7.7 Advanced Update SupportRedHathttpd-0:2.4.6-90.el7_7.1*
Red Hat Enterprise Linux 7.7 Telco Extended Update SupportRedHathttpd-0:2.4.6-90.el7_7.1*
Red Hat Enterprise Linux 7.7 Update Services for SAP SolutionsRedHathttpd-0:2.4.6-90.el7_7.1*
Red Hat Enterprise Linux 8RedHathttpd:2.4-8040020211008164252.522a0ee4*
Red Hat Enterprise Linux 8.1 Extended Update SupportRedHathttpd:2.4-8010020211008125020.c27ad7f8*
Red Hat Enterprise Linux 8.2 Extended Update SupportRedHathttpd:2.4-8020020211008164029.4cda2c84*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHathttpd24-httpd-0:2.4.34-22.el7.1*
Text-Only JBCSRedHat*
Apache2Ubuntubionic*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra/bionic*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntuesm-infra/xenial*
Apache2Ubuntufocal*
Apache2Ubuntuhirsute*
Apache2Ubuntuimpish*
Apache2Ubuntujammy*
Apache2Ubuntutrusty*
Apache2Ubuntuupstream*
Apache2Ubuntuxenial*

References