vulnerability
Apache HTTPD: CVE-2023-27522: Inconsistent Interpretation of HTTP Requests
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:C/A:N) | Mar 7, 2023 | Nov 29, 2023 | Mar 25, 2026 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
Mar 7, 2023
Added
Nov 29, 2023
Modified
Mar 25, 2026
Description
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
Special characters in the origin response header can truncate/split the response forwarded to the client.
Solution
apache-httpd-upgrade-latest
References
- CVE-2023-27522
- https://attackerkb.com/topics/CVE-2023-27522
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-1108
- https://security.gentoo.org/glsa/202309-01
- CWE-444
- EUVD-EUVD-2023-1108
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.