Substitutions in server context that use a backreferences or variables as the first segment of the substitution are affected. Some unsafe RewiteRules will be broken by this change and the rewrite flag "UnsafePrefixStat" can be used to opt back in once ensuring the substitution is appropriately constrained.
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-5729-1 | apache2 security update |
Ubuntu USN |
USN-6885-1 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-6885-3 | Apache HTTP Server vulnerabilities |
Ubuntu USN |
USN-6885-5 | Apache HTTP Server vulnerabilities |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 04 Nov 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sonicwall
Sonicwall sma 200 Sonicwall sma 200 Firmware Sonicwall sma 210 Sonicwall sma 210 Firmware Sonicwall sma 400 Sonicwall sma 400 Firmware Sonicwall sma 410 Sonicwall sma 410 Firmware Sonicwall sma 500v Sonicwall sma 500v Firmware |
|
| CPEs | cpe:2.3:h:sonicwall:sma_200:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_210:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_400:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_410:-:*:*:*:*:*:*:* cpe:2.3:h:sonicwall:sma_500v:-:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_200_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_210_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_400_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_410_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:sonicwall:sma_500v_firmware:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Sonicwall
Sonicwall sma 200 Sonicwall sma 200 Firmware Sonicwall sma 210 Sonicwall sma 210 Firmware Sonicwall sma 400 Sonicwall sma 400 Firmware Sonicwall sma 410 Sonicwall sma 410 Firmware Sonicwall sma 500v Sonicwall sma 500v Firmware |
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 23:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 01 May 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Fri, 02 May 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* |
Fri, 02 May 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 01 May 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
kev
|
Thu, 13 Feb 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache http Server Netapp Netapp ontap 9 |
|
| CPEs | cpe:2.3:a:apache:http_server:2.4.0:*:*:*:*:*:*:* cpe:2.3:a:netapp:ontap_9:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Apache
Apache http Server Netapp Netapp ontap 9 |
|
| Metrics |
ssvc
|
Fri, 13 Sep 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 04 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 13 Aug 2024 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat jboss Core Services
|
|
| CPEs | cpe:/a:redhat:jboss_core_services:1 cpe:/a:redhat:jboss_core_services:1::el7 cpe:/a:redhat:jboss_core_services:1::el8 |
|
| Vendors & Products |
Redhat jboss Core Services
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-03T21:55:40.951Z
Reserved: 2024-06-17T11:09:56.096Z
Link: CVE-2024-38475
Updated: 2025-11-03T21:55:40.951Z
Status : Analyzed
Published: 2024-07-01T19:15:04.883
Modified: 2025-11-13T20:36:16.490
Link: CVE-2024-38475
OpenCVE Enrichment
No data.
Debian DSA
Ubuntu USN