| { |
| "CVE_data_meta": { |
| "ASSIGNER": "security@apache.org", |
| "ID": "CVE-2022-22720", |
| "STATE": "REVIEW", |
| "TITLE": "HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier" |
| }, |
| "affects": { |
| "vendor": { |
| "vendor_data": [ |
| { |
| "product": { |
| "product_data": [ |
| { |
| "product_name": "Apache HTTP Server", |
| "version": { |
| "version_data": [ |
| { |
| "version_affected": "<=", |
| "version_name": "Apache HTTP Server 2.4", |
| "version_value": "2.4.52" |
| } |
| ] |
| } |
| } |
| ] |
| }, |
| "vendor_name": "Apache Software Foundation" |
| } |
| ] |
| } |
| }, |
| "credit": [ |
| { |
| "lang": "eng", |
| "value": "James Kettle <james.kettle portswigger.net>" |
| } |
| ], |
| "data_format": "MITRE", |
| "data_type": "CVE", |
| "data_version": "4.0", |
| "description": { |
| "description_data": [ |
| { |
| "lang": "eng", |
| "value": "Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling" |
| } |
| ] |
| }, |
| "generator": { |
| "engine": "Vulnogram 0.0.9" |
| }, |
| "impact": [ |
| { |
| "other": "important" |
| } |
| ], |
| "problemtype": { |
| "problemtype_data": [ |
| { |
| "description": [ |
| { |
| "lang": "eng", |
| "value": "CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')" |
| } |
| ] |
| } |
| ] |
| }, |
| "references": { |
| "reference_data": [ |
| { |
| "refsource": "CONFIRM" |
| } |
| ] |
| }, |
| "source": { |
| "discovery": "UNKNOWN" |
| }, |
| "timeline": [ |
| { |
| "lang": "eng", |
| "time": "2022-03-14", |
| "value": "2.4.53 released" |
| } |
| ] |
| } |