CVE-2025-58098

8.3 HIGH

📋 TL;DR

This vulnerability in Apache HTTP Server allows remote code execution when Server Side Includes (SSI) is enabled with mod_cgid. Attackers can inject shell commands through improperly escaped query strings in #exec directives. It affects Apache HTTP Server versions before 2.4.66 with specific SSI and mod_cgid configurations.

💻 Affected Systems

Products:
  • Apache HTTP Server
Versions: 2.4.65 and earlier
Operating Systems: All operating systems running affected Apache versions
Default Config Vulnerable: ✅ No
Notes: Requires Server Side Includes (SSI) enabled AND mod_cgid (not mod_cgi) configured. SSI is not enabled by default in Apache.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution with web server privileges, potentially leading to complete system compromise, data theft, or lateral movement.

🟠

Likely Case

Remote code execution allowing attackers to execute arbitrary commands, install malware, or exfiltrate data from the web server.

🟢

If Mitigated

Limited impact if SSI is disabled or proper input validation is implemented, though the vulnerability remains present.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires SSI-enabled pages and mod_cgid configuration. Attackers need to find or know SSI-enabled endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.66

Vendor Advisory: https://httpd.apache.org/security/vulnerabilities_24.html

Restart Required: Yes

Instructions:

1. Download Apache HTTP Server 2.4.66 or later from official Apache mirrors. 2. Stop the Apache service. 3. Install the new version following your OS package manager or compilation process. 4. Restart Apache service.

🔧 Temporary Workarounds

Disable Server Side Includes (SSI)

all

Disable SSI functionality to prevent exploitation of this vulnerability

Edit httpd.conf or appropriate config file and remove or comment out 'Options +Includes' directives
Alternatively, set 'Options -Includes' in relevant directory configurations

Switch from mod_cgid to mod_cgi

all

Replace mod_cgid with mod_cgi module if CGI functionality is required

LoadModule cgi_module modules/mod_cgi.so
Comment out or remove: LoadModule cgid_module modules/mod_cgid.so

🧯 If You Can't Patch

  • Disable SSI functionality completely in Apache configuration
  • Implement strict input validation and filtering for query parameters in SSI-enabled pages

🔍 How to Verify

Check if Vulnerable:

Check Apache version with 'httpd -v' or 'apache2 -v' and verify if SSI is enabled in configuration files (look for 'Options +Includes' or 'Includes' directives)

Check Version:

httpd -v 2>/dev/null || apache2 -v 2>/dev/null || apachectl -v 2>/dev/null

Verify Fix Applied:

Verify Apache version is 2.4.66 or later and confirm SSI configuration if still enabled

📡 Detection & Monitoring

Log Indicators:

  • Unusual query strings containing shell metacharacters in SSI requests
  • Failed or successful #exec cmd directives with suspicious parameters
  • Error logs showing shell command execution attempts

Network Indicators:

  • HTTP requests to SSI-enabled pages with unusual query string patterns
  • Requests containing shell escape characters in query parameters

SIEM Query:

source="apache_access" AND (uri_path="*.shtml" OR uri_path="*.shtm") AND query_string MATCHES "[;&|`$(){}]"

🔗 References

📤 Share & Export