CVE-2024-5055

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to crash XAMPP servers on Windows by sending many incomplete HTTP requests, causing uncontrolled resource consumption. It affects XAMPP installations on Windows, particularly those exposed to untrusted networks. System administrators running vulnerable XAMPP versions are at risk of service disruption.

💻 Affected Systems

Products:
  • XAMPP for Windows
Versions: 7.3.2 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects XAMPP installations on Windows; Linux/macOS versions are not vulnerable. Default XAMPP configurations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service causing XAMPP and potentially the entire Windows system to crash, requiring manual intervention to restore service.

🟠

Likely Case

XAMPP service becomes unresponsive or crashes, disrupting hosted applications and requiring service restart.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring; service may experience temporary performance degradation.

🌐 Internet-Facing: HIGH - Internet-facing XAMPP servers are directly exposed to exploitation attempts from any source.
🏢 Internal Only: MEDIUM - Internal servers are still vulnerable to insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending many incomplete HTTP requests, which is trivial to automate. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.3.3 or later

Vendor Advisory: https://www.apachefriends.org/blog/

Restart Required: Yes

Instructions:

1. Download latest XAMPP version from apachefriends.org. 2. Stop all XAMPP services. 3. Run installer and choose upgrade option. 4. Restart XAMPP services.

🔧 Temporary Workarounds

Rate Limiting via Firewall

windows

Implement connection rate limiting to prevent flood of incomplete HTTP requests

netsh advfirewall firewall add rule name="XAMPP Rate Limit" dir=in action=block remoteip=any protocol=TCP localport=80,443,8080,8443 profile=any enable=yes

Network Segmentation

windows

Restrict access to XAMPP services to trusted networks only

netsh advfirewall firewall add rule name="XAMPP Internal Only" dir=in action=allow remoteip=192.168.0.0/24,10.0.0.0/8,172.16.0.0/12 protocol=TCP localport=80,443,8080,8443 profile=any enable=yes
netsh advfirewall firewall add rule name="Block External XAMPP" dir=in action=block remoteip=any protocol=TCP localport=80,443,8080,8443 profile=any enable=yes

🧯 If You Can't Patch

  • Implement network-level rate limiting using firewall rules or WAF
  • Monitor XAMPP service health and set up automated restart scripts for crash recovery

🔍 How to Verify

Check if Vulnerable:

Check XAMPP control panel or read xampp-control.ini for version number. If version is 7.3.2 or earlier, system is vulnerable.

Check Version:

type "C:\xampp\xampp-control.ini" | findstr "Version"

Verify Fix Applied:

After upgrade, verify version is 7.3.3 or later in XAMPP control panel. Test with simulated incomplete HTTP requests using tools like curl or custom scripts.

📡 Detection & Monitoring

Log Indicators:

  • Multiple incomplete HTTP requests in Apache logs
  • XAMPP service crash events in Windows Event Log
  • High CPU/memory usage by Apache process

Network Indicators:

  • Unusual volume of incomplete HTTP requests to XAMPP ports
  • Multiple TCP SYN packets without complete handshakes

SIEM Query:

source="apache_access.log" | where http_status="-" | stats count by src_ip | where count > 100

🔗 References

📤 Share & Export