HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
References
| Link | Resource |
|---|---|
| https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html | Third Party Advisory |
| https://security.gentoo.org/glsa/202309-01 | Third Party Advisory |
| https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
| https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html | Third Party Advisory |
| https://security.gentoo.org/glsa/202309-01 | Third Party Advisory |
Configurations
History
01 May 2025, 15:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://security.gentoo.org/glsa/202309-01 - Third Party Advisory |
13 Feb 2025, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client. |
21 Nov 2024, 07:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory | |
| References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html - Third Party Advisory | |
| References | () https://security.gentoo.org/glsa/202309-01 - |
26 May 2023, 15:05
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:unbit:uwsgi:-:*:*:*:*:*:*:* |
|
| References | (MISC) https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html - Third Party Advisory |
25 Apr 2023, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client. | |
| References |
|
14 Mar 2023, 15:35
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | (MISC) https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory | |
| CPE | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* |
07 Mar 2023, 16:37
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-03-07 16:15
Updated : 2025-05-01 15:34
NVD link : CVE-2023-27522
Mitre link : CVE-2023-27522
CVE.ORG link : CVE-2023-27522
JSON object : View
Products Affected
debian
- debian_linux
apache
- http_server
unbit
- uwsgi
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
