CVE-2024-47252
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-11-04

Assigner: Apache Software Foundation

Description
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-11-04
Generated
2026-05-07
AI Q&A
2025-07-10
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache http_server From 2.4.0 (inc) to 2.4.64 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-150 The product receives input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could be interpreted as escape, meta, or control character sequences when they are sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability involves insufficient escaping of user-supplied data in the mod_ssl module of Apache HTTP Server versions 2.4.63 and earlier. Specifically, when logging configurations use CustomLog with "%{varname}x" or "%{varname}c" to log variables from mod_ssl like SSL_TLS_SNI, no escaping is done. This allows an untrusted SSL/TLS client to insert escape characters into log files, potentially leading to log injection or manipulation.


How can this vulnerability impact me? :

The vulnerability can allow an attacker who connects via SSL/TLS to insert escape characters into server log files. This can lead to log file manipulation or injection attacks, which may obscure malicious activity, mislead administrators, or potentially exploit log processing tools that do not expect such characters.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart