vulnerability
Rocky Linux: CVE-2023-27522: httpd-2.4 (RLSA-2023-5050)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:N/AC:L/Au:N/C:N/I:C/A:N) | 2023-03-07 | 2024-03-05 | 2025-02-20 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
2023-03-07
Added
2024-03-05
Modified
2025-02-20
Description
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
Solution(s)
rocky-upgrade-httpdrocky-upgrade-httpd-debuginforocky-upgrade-httpd-debugsourcerocky-upgrade-httpd-develrocky-upgrade-httpd-toolsrocky-upgrade-httpd-tools-debuginforocky-upgrade-mod_http2rocky-upgrade-mod_http2-debuginforocky-upgrade-mod_http2-debugsourcerocky-upgrade-mod_ldaprocky-upgrade-mod_ldap-debuginforocky-upgrade-mod_mdrocky-upgrade-mod_md-debuginforocky-upgrade-mod_md-debugsourcerocky-upgrade-mod_proxy_htmlrocky-upgrade-mod_proxy_html-debuginforocky-upgrade-mod_sessionrocky-upgrade-mod_session-debuginforocky-upgrade-mod_sslrocky-upgrade-mod_ssl-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.