| { |
| "containers": { |
| "cna": { |
| "affected": [ |
| { |
| "defaultStatus": "unaffected", |
| "product": "Apache HTTP Server", |
| "vendor": "Apache Software Foundation", |
| "versions": [ |
| { |
| "lessThanOrEqual": "2.4.58", |
| "status": "affected", |
| "version": "0", |
| "versionType": "semver" |
| } |
| ] |
| } |
| ], |
| "credits": [ |
| { |
| "lang": "en", |
| "type": "finder", |
| "value": "Orange Tsai (@orange_8361) from DEVCORE" |
| } |
| ], |
| "descriptions": [ |
| { |
| "lang": "en", |
| "supportingMedia": [ |
| { |
| "base64": false, |
| "type": "text/html", |
| "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.<br><br>This issue affects Apache HTTP Server: through 2.4.58.<br>" |
| } |
| ], |
| "value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n" |
| } |
| ], |
| "metrics": [ |
| { |
| "cvssV3_1": { |
| "attackComplexity": "HIGH", |
| "attackVector": "NETWORK", |
| "availabilityImpact": "NONE", |
| "baseScore": 6.8, |
| "baseSeverity": "MEDIUM", |
| "confidentialityImpact": "HIGH", |
| "integrityImpact": "NONE", |
| "privilegesRequired": "NONE", |
| "scope": "CHANGED", |
| "userInteraction": "NONE", |
| "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", |
| "version": "3.1" |
| }, |
| "format": "CVSS", |
| "scenarios": [ |
| { |
| "lang": "en", |
| "value": "GENERAL" |
| } |
| ] |
| } |
| ], |
| "problemTypes": [ |
| { |
| "descriptions": [ |
| { |
| "description": "HTTP response splitting", |
| "lang": "en" |
| } |
| ] |
| } |
| ], |
| "providerMetadata": { |
| "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09" |
| }, |
| "source": { |
| "discovery": "EXTERNAL" |
| }, |
| "title": "Apache HTTP Server: HTTP response splitting", |
| "x_generator": { |
| "engine": "Vulnogram 0.1.0-dev" |
| }, |
| "timeline": [ |
| { |
| "lang": "eng", |
| "time": "2024-04-04", |
| "value": "2.4.59 released" |
| } |
| ] |
| } |
| }, |
| "cveMetadata": { |
| "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", |
| "cveId": "CVE-2023-38709", |
| "serial": 1, |
| "state": "PUBLISHED" |
| }, |
| "dataType": "CVE_RECORD", |
| "dataVersion": "5.0" |
| } |