HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
References
Link | Resource |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html | Third Party Advisory |
https://security.gentoo.org/glsa/202309-01 | |
https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html | Third Party Advisory |
https://security.gentoo.org/glsa/202309-01 |
Configurations
History
21 Nov 2024, 07:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html - Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202309-01 - |
08 Sep 2023, 22:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
24 Aug 2023, 13:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:unbit:uwsgi:*:*:*:*:*:*:*:* |
26 May 2023, 15:05
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html - Third Party Advisory | |
CPE | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:unbit:uwsgi:-:*:*:*:*:*:*:* |
|
First Time |
Unbit
Debian debian Linux Unbit uwsgi Debian |
Information
Published : 2023-03-07 16:15
Updated : 2024-11-21 07:53
NVD link : CVE-2023-27522
Mitre link : CVE-2023-27522
CVE.ORG link : CVE-2023-27522
JSON object : View
Products Affected
unbit
- uwsgi
debian
- debian_linux
apache
- http_server
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')