4get-modified
Installation
Install from the command line using your preferred container software:
Docker
docker pull oci.registry.sudovanilla.org/4get-modified:latest Podman
podman pull oci.registry.sudovanilla.org/4get-modified:latest Vulnerabilities
CRITICAL
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
CVE-2025-49794
CRITICAL
libxml: Heap use after free (UAF) leads to Denial of service (DoS)
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Reference: https://avd.aquasec.com/nvd/cve-2025-49794
CRITICAL
libxml: Type confusion leads to Denial of service (DoS)
CVE-2025-49796
CRITICAL
libxml: Type confusion leads to Denial of service (DoS)
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
Reference: https://avd.aquasec.com/nvd/cve-2025-49796
HIGH
httpd: insufficient escaping of user-supplied data in mod_ssl
CVE-2024-47252
HIGH
httpd: insufficient escaping of user-supplied data in mod_ssl
Insufficient escaping of user-supplied data in mod_ssl in Apache HTTP Server 2.4.63 and earlier allows an untrusted SSL/TLS client to insert escape characters into log files in some configurations. In a logging configuration where CustomLog is used with "%{varname}x" or "%{varname}c" to log variables provided by mod_ssl such as SSL_TLS_SNI, no escaping is performed by either mod_log_config or mod_ssl and unsanitized data provided by the client may appear in log files.
Reference: https://avd.aquasec.com/nvd/cve-2024-47252
HIGH
httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption
CVE-2025-23048
HIGH
httpd: mod_ssl: access control bypass by trusted clients is possible using TLS 1.3 session resumption
In some mod_ssl configurations on Apache HTTP Server 2.4.35 through to 2.4.63, an access control bypass by trusted clients is possible using TLS 1.3 session resumption. Configurations are affected when mod_ssl is configured for multiple virtual hosts, with each restricted to a different set of trusted client certificates (for example with a different SSLCACertificateFile/Path setting). In such a case, a client trusted to access one virtual host may be able to access another virtual host, if SSLStrictSNIVHostCheck is not enabled in either virtual host.
Reference: https://avd.aquasec.com/nvd/cve-2025-23048
HIGH
httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module
CVE-2025-49630
HIGH
httpd: mod_proxy_http2: untrusted input from a client causes an assertion to fail in the Apache mod_proxy_http2 module
In certain proxy configurations, a denial of service attack against Apache HTTP Server versions 2.4.26 through to 2.4.63 can be triggered by untrusted clients causing an assertion in mod_proxy_http2. Configurations affected are a reverse proxy is configured for an HTTP/2 backend, with ProxyPreserveHost set to "on".
Reference: https://avd.aquasec.com/nvd/cve-2025-49630
HIGH
libxml: Null pointer dereference leads to Denial of service (DoS)
CVE-2025-49795
HIGH
libxml: Null pointer dereference leads to Denial of service (DoS)
A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.
Reference: https://avd.aquasec.com/nvd/cve-2025-49795
HIGH
httpd: HTTP Session Hijack via a TLS upgrade
CVE-2025-49812
HIGH
httpd: HTTP Session Hijack via a TLS upgrade
In some mod_ssl configurations on Apache HTTP Server versions through to 2.4.63, an HTTP desynchronisation attack allows a man-in-the-middle attacker to hijack an HTTP session via a TLS upgrade. Only configurations using "SSLEngine optional" to enable TLS upgrades are affected. Users are recommended to upgrade to version 2.4.64, which removes support for TLS upgrade.
Reference: https://avd.aquasec.com/nvd/cve-2025-49812
HIGH
mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals
CVE-2025-55753
HIGH
mod_md: Apache HTTP Server: mod_md (ACME), unintended retry intervals
An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds. This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Reference: https://avd.aquasec.com/nvd/cve-2025-55753
HIGH
httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...
CVE-2025-58098
HIGH
httpd: Apache HTTP Server: Server Side Includes adds query string to #exec cmd=...
Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives. This issue affects Apache HTTP Server before 2.4.66. Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Reference: https://avd.aquasec.com/nvd/cve-2025-58098
HIGH
httpd: Apache HTTP Server: NTLM Leakage on Windows via SSRF
CVE-2025-59775
HIGH
httpd: Apache HTTP Server: NTLM Leakage on Windows via SSRF
Server-Side Request Forgery (SSRF) vulnerability in Apache HTTP Server on Windows with AllowEncodedSlashes On and MergeSlashes Off allows to potentially leak NTLM hashes to a malicious server via SSRF and malicious requests or content Users are recommended to upgrade to version 2.4.66, which fixes the issue.
Reference: https://avd.aquasec.com/nvd/cve-2025-59775