CVE-2024-42516

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

History

04 Nov 2025, 22:16

Type Values Removed Values Added
References
  • () http://www.openwall.com/lists/oss-security/2025/07/10/2 -
  • () http://www.openwall.com/lists/oss-security/2025/07/10/3 -

03 Nov 2025, 20:16

Type Values Removed Values Added
References
  • () https://lists.debian.org/debian-lts-announce/2025/08/msg00009.html -

29 Jul 2025, 15:16

Type Values Removed Values Added
First Time Apache
Apache http Server
CPE cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
References () https://httpd.apache.org/security/vulnerabilities_24.html - () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory

15 Jul 2025, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 17:15

Updated : 2025-11-04 22:16


NVD link : CVE-2024-42516

Mitre link : CVE-2024-42516

CVE.ORG link : CVE-2024-42516


JSON object : View

Products Affected

apache

  • http_server
CWE
CWE-20

Improper Input Validation