| { |
| "CVE_data_meta": { |
| "ASSIGNER": "security@apache.org", |
| "ID": "CVE-2021-33193", |
| "STATE": "PUBLIC", |
| "TITLE": "Request splitting via HTTP/2 method injection and mod_proxy" |
| }, |
| "affects": { |
| "vendor": { |
| "vendor_data": [ |
| { |
| "product": { |
| "product_data": [ |
| { |
| "product_name": "Apache HTTP Server", |
| "version": { |
| "version_data": [ |
| { |
| "version_name": "Apache HTTP Server 2.4", |
| "version_value": "2.4.17 to 2.4.48" |
| } |
| ] |
| } |
| } |
| ] |
| }, |
| "vendor_name": "Apache Software Foundation" |
| } |
| ] |
| } |
| }, |
| "credit": [ |
| { |
| "lang": "eng", |
| "value": "Reported by James Kettle of PortSwigger" |
| } |
| ], |
| "data_format": "MITRE", |
| "data_type": "CVE", |
| "data_version": "4.0", |
| "description": { |
| "description_data": [ |
| { |
| "lang": "eng", |
| "value": "A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning.\n\nThis issue affects Apache HTTP Server 2.4.17 to 2.4.48." |
| } |
| ] |
| }, |
| "generator": { |
| "engine": "Vulnogram 0.0.9" |
| }, |
| "impact": [ |
| { |
| "other": "moderate" |
| } |
| ], |
| "problemtype": { |
| "problemtype_data": [ |
| { |
| "description": [ |
| { |
| "lang": "eng", |
| "value": "Request Splitting" |
| } |
| ] |
| } |
| ] |
| }, |
| "references": { |
| "reference_data": [ |
| { |
| "refsource": "CONFIRM", |
| "url": "https://portswigger.net/research/http2" |
| }, |
| { |
| "refsource": "CONFIRM", |
| "url": "https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch" |
| } |
| ] |
| }, |
| "source": { |
| "discovery": "UNKNOWN" |
| }, |
| "timeline": [ |
| { |
| "lang": "eng", |
| "time": "2021-05-11", |
| "value": "reported" |
| }, |
| { |
| "lang": "eng", |
| "time": "2021-08-06", |
| "value": "public" |
| }, |
| { |
| "lang": "eng", |
| "time": "--", |
| "value": "2.4.49 released" |
| } |
| ] |
| } |