CVE-2024-39884
Publication date 4 July 2024
Last updated 30 May 2025
Ubuntu priority
Cvss 3 Severity Score
A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers. "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.61, which fixes this issue.
Status
Package | Ubuntu Release | Status |
---|---|---|
apache2 | 25.04 plucky |
Fixed 2.4.62-1ubuntu1
|
24.10 oracular |
Fixed 2.4.62-1ubuntu1
|
|
24.04 LTS noble |
Fixed 2.4.58-1ubuntu8.2
|
|
22.04 LTS jammy |
Fixed 2.4.52-1ubuntu4.10
|
|
20.04 LTS focal |
Fixed 2.4.41-4ubuntu3.19
|
|
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty |
Needs evaluation
|
Patch details
Package | Patch details |
---|---|
apache2 |
|
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
References
Related Ubuntu Security Notices (USN)
- USN-6885-1
- Apache HTTP Server vulnerabilities
- 8 July 2024