SSRF in Apache HTTP Server with modproxy loaded allows an attacker to send outbound proxy requests to a URL controlled by the attacker. Requires an unlikely configuration where modheaders is configured to modify the Content-Type request or response header with a value provided in the HTTP request.
Users are recommended to upgrade to version 2.4.64 which fixes this issue.
{ "severity": "High", "cpes": [ "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*" ] }