vulnerability
Apache HTTPD: Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting (CVE-2023-27522)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:C/A:N) | 2023-03-07 | 2023-11-29 | 2025-02-14 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
2023-03-07
Added
2023-11-29
Modified
2025-02-14
Description
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
Special characters in the origin response header can truncate/split the response forwarded to the client.
Solution
apache-httpd-upgrade-latest

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.