CVE-2024-24795

HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*

History

30 Jun 2025, 12:55

Type Values Removed Values Added
First Time Apple
Fedoraproject
Fedoraproject fedora
Apache
Debian
Apache http Server
Apple macos
Broadcom fabric Operating System
Netapp
Broadcom
Debian debian Linux
Netapp ontap Tools
Netapp ontap
CPE cpe:2.3:a:netapp:ontap_tools:10:*:*:*:*:vmware_vsphere:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:broadcom:fabric_operating_system:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
References () https://httpd.apache.org/security/vulnerabilities_24.html - () https://httpd.apache.org/security/vulnerabilities_24.html - Release Notes, Vendor Advisory
References () http://seclists.org/fulldisclosure/2024/Jul/18 - () http://seclists.org/fulldisclosure/2024/Jul/18 - Mailing List
References () http://www.openwall.com/lists/oss-security/2024/04/04/5 - () http://www.openwall.com/lists/oss-security/2024/04/04/5 - Mailing List
References () https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html - () https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html - Mailing List, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html - () https://lists.debian.org/debian-lts-announce/2024/05/msg00014.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/ - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/ - Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/ - () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/ - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20240415-0013/ - () https://security.netapp.com/advisory/ntap-20240415-0013/ - Third Party Advisory
References () https://support.apple.com/kb/HT214119 - () https://support.apple.com/kb/HT214119 - Third Party Advisory

Information

Published : 2024-04-04 20:15

Updated : 2025-06-30 12:55


NVD link : CVE-2024-24795

Mitre link : CVE-2024-24795

CVE.ORG link : CVE-2024-24795


JSON object : View

Products Affected

apache

  • http_server

netapp

  • ontap_tools
  • ontap

debian

  • debian_linux

broadcom

  • fabric_operating_system

apple

  • macos

fedoraproject

  • fedora
CWE
CWE-113

Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting')

CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')