vulnerability
Apache HTTPD: Apache HTTP Server: HTTP response splitting (CVE-2024-42516)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:N/I:C/A:N) | Jul 10, 2025 | Jul 18, 2025 | Nov 6, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
Jul 10, 2025
Added
Jul 18, 2025
Modified
Nov 6, 2025
Description
HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.
Users are recommended to upgrade to version 2.4.64, which fixes this issue.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.
Users are recommended to upgrade to version 2.4.64, which fixes this issue.
Solution
apache-httpd-upgrade-latest
References
- URL-http://www.openwall.com/lists/oss-security/2025/07/10/2
- URL-http://www.openwall.com/lists/oss-security/2025/07/10/3
- URL-https://httpd.apache.org/security/vulnerabilities_24.html
- URL-https://lists.debian.org/debian-lts-announce/2025/08/msg00009.html
- CVE-2024-42516
- https://attackerkb.com/topics/CVE-2024-42516
- CWE-20
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.