ALPINE-CVE-2023-27522 PUBLISHED CVSS 7.5 HIGH

HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.

Risk Scores

CVSS v3.1
7.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Affected Products

VendorProductVersions
Alpine:v3.19apache22.4.41-r0, 2.4.39-r0, 2.4.20-r2
Alpine:v3.22apache22.2.20-r0, 2.4.9-r1, 2.4.9-r0
Alpine:v3.23apache22.4.29-r0, 2.4.28-r0, 2.4.27-r2
Alpine:v3.21apache22.2.16-r0, 2.4.39-r0, 2.4.38-r2
Alpine:v3.15apache22.4.28-r0, 2.4.33-r0, 2.4.39-r0
Alpine:v3.16apache22.4.43-r0, 0, 2.2.16-r1
Alpine:v3.17apache22.4.18-r1, 2.2.22-r0, 2.2.22-r1
Alpine:v3.14apache22.4.52-r0, 2.4.53-r0, 2.4.54-r0
Alpine:v3.18apache22.4.25-r0, 2.4.9-r1, 2.4.9-r0
Alpine:v3.20apache22.4.25-r0, 0, 2.2.16-r0

Timeline

References

Open in Interactive Console →