QID 730765
Date Published: 2023-03-20
QID 730765: Apache Hypertext Transfer Protocol (HTTP) Server Response Smuggling Vulnerability
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. Special characters in the origin response header can truncate/split the response forwarded to the client.
Affected Versions:
This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55
QID Detection Logic(Unauthenticated):
This QID checks for vulnerable version of Apache HTTP Server by sending a GET request to a target and extracting the version from the response header.
Successful exploitation of the vulnerability may result in integrity impact.
Solution
Customers are advised to upgrade to Apache HTTP Server version 2.4.56 or later. For more information please refer to Apache HTTP Server Security Advisory
Vendor References
- Apache HTTP Server Security Advisory -
httpd.apache.org/security/vulnerabilities_24.html
CVEs related to QID 730765
Software Advisories
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Apache HTTP Server Security Advisory |
|