QID 730758

Date Published: 2023-03-16

QID 730758: Apache Hypertext Transfer Protocol (HTTP) Server Request Smuggling Vulnerability

Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.

Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.

Affected Versions:
Apache HTTP Server Versions 2.4.0 through 2.4.55 (including)

QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version of Apache HTTP Server by sending a GET request to a target and extracting the version from the response header.

Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.4 severity.
  • Solution
    Customers are advised to upgrade to Apache HTTP Server version 2.4.56 or later. For more information please refer to Apache HTTP Server Security Advisory
    Vendor References

    CVEs related to QID 730758

    Software Advisories
    Advisory ID Software Component Link
    Apache HTTP Server Security Advisory URL Logo httpd.apache.org/security/vulnerabilities_24.html#2.4.56