CVE-2024-39884

Publication date 4 July 2024

Last updated 30 May 2025


Ubuntu priority

Cvss 3 Severity Score

6.2 · Medium

Score breakdown

A regression in the core of Apache HTTP Server 2.4.60 ignores some use of the legacy content-type based configuration of handlers.   "AddType" and similar configuration, under some circumstances where files are requested indirectly, result in source code disclosure of local content. For example, PHP scripts may be served instead of interpreted. Users are recommended to upgrade to version 2.4.61, which fixes this issue.

Status

Package Ubuntu Release Status
apache2 25.04 plucky
Fixed 2.4.62-1ubuntu1
24.10 oracular
Fixed 2.4.62-1ubuntu1
24.04 LTS noble
Fixed 2.4.58-1ubuntu8.2
23.10 mantic
Fixed 2.4.57-2ubuntu2.5
22.04 LTS jammy
Fixed 2.4.52-1ubuntu4.10
20.04 LTS focal
Fixed 2.4.41-4ubuntu3.19
18.04 LTS bionic
Needs evaluation
16.04 LTS xenial
Needs evaluation
14.04 LTS trusty
Needs evaluation

Patch details

For informational purposes only. We recommend not to cherry-pick updates. How can I get the fixes?

Package Patch details
apache2

Severity score breakdown

Parameter Value
Base score 6.2 · Medium
Attack vector Local
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality High
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

References

Related Ubuntu Security Notices (USN)

    • USN-6885-1
    • Apache HTTP Server vulnerabilities
    • 8 July 2024

Other references