HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
References
Link | Resource |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html | Third Party Advisory |
https://security.gentoo.org/glsa/202309-01 |
Configurations
History
26 May 2023, 15:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:unbit:uwsgi:-:*:*:*:*:*:*:* |
|
References | (MISC) https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html - Third Party Advisory |
25 Apr 2023, 00:15
Type | Values Removed | Values Added |
---|---|---|
Summary | HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client. | |
References |
|
14 Mar 2023, 15:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | (MISC) https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory |
07 Mar 2023, 16:37
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-07 16:15
Updated : 2024-10-23 17:35
NVD link : CVE-2023-27522
Mitre link : CVE-2023-27522
CVE.ORG link : CVE-2023-27522
JSON object : View
Products Affected
unbit
- uwsgi
debian
- debian_linux
apache
- http_server
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')