QID 730758
Date Published: 2023-03-16
QID 730758: Apache Hypertext Transfer Protocol (HTTP) Server Request Smuggling Vulnerability
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.
Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.
Affected Versions:
Apache HTTP Server Versions 2.4.0 through 2.4.55 (including)
QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version of Apache HTTP Server by sending a GET request to a target and extracting the version from the response header.
Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning.
- Apache HTTP Server Security Advisory -
httpd.apache.org/security/vulnerabilities_24.html#2.4.56
CVEs related to QID 730758
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Apache HTTP Server Security Advisory |
|