QID 730765

Date Published: 2023-03-20

QID 730765: Apache Hypertext Transfer Protocol (HTTP) Server Response Smuggling Vulnerability

HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. Special characters in the origin response header can truncate/split the response forwarded to the client.

Affected Versions:
This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55

QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version of Apache HTTP Server by sending a GET request to a target and extracting the version from the response header.

Successful exploitation of the vulnerability may result in integrity impact.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution
    Customers are advised to upgrade to Apache HTTP Server version 2.4.56 or later. For more information please refer to Apache HTTP Server Security Advisory
    Vendor References

    CVEs related to QID 730765

    Software Advisories
    Advisory ID Software Component Link
    Apache HTTP Server Security Advisory URL Logo httpd.apache.org/security/vulnerabilities_24.html#2.4.56