HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
References
Link | Resource |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html | Third Party Advisory |
https://security.gentoo.org/glsa/202309-01 | |
https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html | Third Party Advisory |
https://security.gentoo.org/glsa/202309-01 |
Configurations
History
13 Feb 2025, 17:16
Type | Values Removed | Values Added |
---|---|---|
Summary | (en) HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client. |
Information
Published : 2023-03-07 16:15
Updated : 2025-02-13 17:16
NVD link : CVE-2023-27522
Mitre link : CVE-2023-27522
CVE.ORG link : CVE-2023-27522
JSON object : View
Products Affected
debian
- debian_linux
unbit
- uwsgi
apache
- http_server
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')