Looking for the vulnerability index of Invicti's legacy products?
Apache HTTP Server Source Code Disclosure - Vulnerability Database

Apache HTTP Server Source Code Disclosure

Description

A vulnerability in Apache HTTP Server allows unauthorized attackers to bypass access controls and retrieve the source code of web applications. By sending specially crafted HTTP requests, attackers can read server-side scripts and application files that should normally be processed by the server rather than displayed as plain text. This flaw exposes the underlying code that powers web applications hosted on affected Apache servers.

Remediation

Apply the following remediation steps to address this vulnerability:

1. Immediately upgrade Apache HTTP Server to the latest stable version that addresses this source code disclosure flaw
2. Review and harden Apache configuration files to ensure proper handling of application files:

# Ensure proper handler configuration in httpd.conf or .htaccess
<FilesMatch "\.php$">
    SetHandler application/x-httpd-php
</FilesMatch>

# Deny direct access to sensitive files
<FilesMatch "\.(inc|conf|config)$">
    Require all denied
</FilesMatch>
3. Verify that all application file extensions are properly mapped to their respective handlers
4. Conduct a security audit to determine if source code was accessed during the vulnerability window
5. Rotate all credentials, API keys, and secrets that may have been exposed in source code
6. Implement Web Application Firewall (WAF) rules to detect and block suspicious request patterns

Related Vulnerabilities