| { |
| "containers": { |
| "cna": { |
| "affected": [ |
| { |
| "defaultStatus": "unaffected", |
| "product": "Apache HTTP Server", |
| "vendor": "Apache Software Foundation", |
| "versions": [ |
| { |
| "lessThanOrEqual": "2.4.55", |
| "status": "affected", |
| "version": "2.4.30", |
| "versionType": "semver" |
| } |
| ] |
| } |
| ], |
| "credits": [ |
| { |
| "lang": "en", |
| "type": "finder", |
| "value": "Dimas Fariski Setyawan Putra (nyxsorcerer)" |
| } |
| ], |
| "descriptions": [ |
| { |
| "lang": "en", |
| "supportingMedia": [ |
| { |
| "base64": false, |
| "type": "text/html", |
| "value": "<div>HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_<code>proxy_uwsgi</code>. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.</div><div>Special characters in the origin response header can truncate/split the response forwarded to the client.<br></div>" |
| } |
| ], |
| "value": "HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.\n\nSpecial characters in the origin response header can truncate/split the response forwarded to the client.\n\n\n" |
| } |
| ], |
| "metrics": [ |
| { |
| "other": { |
| "content": { |
| "text": "moderate" |
| }, |
| "type": "Textual description of severity" |
| } |
| } |
| ], |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "cweId": "CWE-444", |
| "description": "CWE-444 Inconsistent Interpretation of HTTP Responses ('HTTP Response Smuggling')", |
| "lang": "en", |
| "type": "CWE" |
| } |
| ] |
| } |
| ], |
| "providerMetadata": { |
| "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09" |
| }, |
| "references": [ |
| { |
| "tags": [ |
| "vendor-advisory" |
| ], |
| "url": "https://httpd.apache.org/security/vulnerabilities_24.html" |
| } |
| ], |
| "source": { |
| "discovery": "UNKNOWN" |
| }, |
| "timeline": [ |
| { |
| "lang": "en", |
| "time": "2023-01-29T10:42:00.000Z", |
| "value": "Reported to security team" |
| }, |
| { |
| "lang": "eng", |
| "time": "2023-03-07", |
| "value": "fixed by r1908094 in 2.4.x" |
| }, |
| { |
| "lang": "eng", |
| "time": "2023-03-07", |
| "value": "2.4.56 released" |
| } |
| ], |
| "title": "Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting", |
| "x_generator": { |
| "engine": "Vulnogram 0.1.0-dev" |
| } |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", |
| "cveId": "CVE-2023-27522", |
| "serial": 1, |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |