CVE-2025-59775

7.5 HIGH

📋 TL;DR

This SSRF vulnerability in Apache HTTP Server on Windows allows attackers to force the server to make requests to malicious servers, potentially leaking NTLM authentication hashes. It affects Windows systems running Apache with specific configurations (AllowEncodedSlashes On and MergeSlashes Off). Attackers could capture NTLM hashes for offline cracking or relay attacks.

💻 Affected Systems

Products:
  • Apache HTTP Server
Versions: Versions before 2.4.66
Operating Systems: Windows
Default Config Vulnerable: ✅ No
Notes: Only vulnerable when both AllowEncodedSlashes is set to On AND MergeSlashes is set to Off in configuration. Default configurations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers capture NTLM hashes, crack them offline to obtain credentials, and gain unauthorized access to internal systems or domain resources.

🟠

Likely Case

Attackers capture NTLM hashes and use them in pass-the-hash attacks to compromise additional systems within the network.

🟢

If Mitigated

With proper network segmentation and monitoring, hash capture is detected before successful exploitation.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires specific configuration conditions and ability to trigger SSRF requests. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.66

Vendor Advisory: https://httpd.apache.org/security/vulnerabilities_24.html

Restart Required: Yes

Instructions:

1. Download Apache HTTP Server 2.4.66 or later from official Apache mirrors. 2. Stop the Apache service. 3. Backup configuration files. 4. Install the new version. 5. Restore configurations. 6. Start the Apache service.

🔧 Temporary Workarounds

Change configuration settings

windows

Set AllowEncodedSlashes to Off or MergeSlashes to On to prevent exploitation

In httpd.conf: Set AllowEncodedSlashes Off OR MergeSlashes On

Restrict outbound connections

windows

Use firewall rules to limit Apache server's ability to make outbound requests

Windows Firewall: New outbound rule blocking Apache process from connecting to untrusted networks

🧯 If You Can't Patch

  • Apply configuration workarounds (set AllowEncodedSlashes Off or MergeSlashes On)
  • Implement network segmentation to restrict Apache servers from making outbound requests to untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check Apache version with 'httpd -v' and verify configuration contains both 'AllowEncodedSlashes On' and 'MergeSlashes Off'

Check Version:

httpd -v

Verify Fix Applied:

Verify Apache version is 2.4.66 or higher with 'httpd -v' command

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Apache process
  • Requests with encoded slashes in URLs
  • Failed authentication attempts following suspicious outbound requests

Network Indicators:

  • Apache server making unexpected outbound HTTP/S requests
  • Traffic to unfamiliar external IP addresses from Apache process

SIEM Query:

source="apache_access.log" AND (url CONTAINS "%2F" OR url CONTAINS "%5C") AND dest_ip NOT IN trusted_networks

🔗 References

📤 Share & Export