cpe:2.3:a:apache:http_server:2.4.7:*:*:*:*:*:*:*
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.
Source: Apache Software Foundation
Max CVSS
N/A
EPSS Score
0.05%
Published
2024-04-04
Updated
2024-05-04
When a HTTP/2 stream was reset (RST frame) by a client, there was a time window were the request's memory resources were not reclaimed immediately. Instead, de-allocation was deferred to connection close. A client could send new requests and resets, keeping the connection busy and open and causing the memory footprint to keep on growing. On connection close, all resources were reclaimed, but the process might run out of memory before that. This was found by the reporter during testing of CVE-2023-44487 (HTTP/2 Rapid Reset Exploit) with their own test client. During "normal" HTTP/2 use, the probability to hit this bug is very low. The kept memory would not become noticeable before the connection closes or times out. Users are recommended to upgrade to version 2.4.58, which fixes the issue.
Source: Apache Software Foundation
Max CVSS
5.9
EPSS Score
0.18%
Published
2023-10-23
Updated
2023-11-01
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Source: Apache Software Foundation
Max CVSS
N/A
EPSS Score
0.05%
Published
2024-04-04
Updated
2024-05-04
Out-of-bounds Read vulnerability in mod_macro of Apache HTTP Server.This issue affects Apache HTTP Server: through 2.4.57.
Source: Apache Software Foundation
Max CVSS
7.5
EPSS Score
0.76%
Published
2023-10-23
Updated
2023-11-03
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
Source: Apache Software Foundation
Max CVSS
9.8
EPSS Score
0.74%
Published
2023-03-07
Updated
2024-01-02
Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
Source: Apache Software Foundation
Max CVSS
5.3
EPSS Score
0.08%
Published
2023-01-17
Updated
2023-09-08
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
Source: Apache Software Foundation
Max CVSS
9.0
EPSS Score
2.24%
Published
2023-01-17
Updated
2023-09-08
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
Source: Apache Software Foundation
Max CVSS
9.8
EPSS Score
1.04%
Published
2022-06-09
Updated
2022-08-19
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
Source: Apache Software Foundation
Max CVSS
7.5
EPSS Score
0.32%
Published
2022-06-09
Updated
2023-07-21
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
Source: Apache Software Foundation
Max CVSS
7.5
EPSS Score
3.24%
Published
2022-06-09
Updated
2022-08-24
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
Source: Apache Software Foundation
Max CVSS
9.1
EPSS Score
1.47%
Published
2022-06-09
Updated
2022-08-24
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
Source: Apache Software Foundation
Max CVSS
5.3
EPSS Score
0.35%
Published
2022-06-09
Updated
2022-08-24
Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.
Source: Apache Software Foundation
Max CVSS
5.3
EPSS Score
0.16%
Published
2022-06-09
Updated
2022-06-24
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
Source: Apache Software Foundation
Max CVSS
7.5
EPSS Score
0.64%
Published
2022-06-09
Updated
2022-08-24
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
Source: Apache Software Foundation
Max CVSS
9.8
EPSS Score
12.02%
Published
2022-03-14
Updated
2022-10-26
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
Source: Apache Software Foundation
Max CVSS
9.1
EPSS Score
0.34%
Published
2022-03-14
Updated
2022-11-02
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
Source: Apache Software Foundation
Max CVSS
9.8
EPSS Score
1.19%
Published
2022-03-14
Updated
2022-11-02
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
Source: Apache Software Foundation
Max CVSS
7.5
EPSS Score
38.74%
Published
2022-03-14
Updated
2022-11-02
A carefully crafted request body can cause a buffer overflow in the mod_lua multipart parser (r:parsebody() called from Lua scripts). The Apache httpd team is not aware of an exploit for the vulnerabilty though it might be possible to craft one. This issue affects Apache HTTP Server 2.4.51 and earlier.
Source: Apache Software Foundation
Max CVSS
9.8
EPSS Score
8.81%
Published
2021-12-20
Updated
2023-04-03
A crafted URI sent to httpd configured as a forward proxy (ProxyRequests on) can cause a crash (NULL pointer dereference) or, for configurations mixing forward and reverse proxy declarations, can allow for requests to be directed to a declared Unix Domain Socket endpoint (Server Side Request Forgery). This issue affects Apache HTTP Server 2.4.7 up to 2.4.51 (included).
Source: Apache Software Foundation
Max CVSS
8.2
EPSS Score
30.75%
Published
2021-12-20
Updated
2022-11-02

CVE-2021-40438

Known exploited
A crafted request uri-path can cause mod_proxy to forward the request to an origin server choosen by the remote user. This issue affects Apache HTTP Server 2.4.48 and earlier.
Source: Apache Software Foundation
Max CVSS
9.0
EPSS Score
97.45%
Published
2021-09-16
Updated
2022-10-05
CISA KEV Added
2021-12-01
ap_escape_quotes() may write beyond the end of a buffer when given malicious input. No included modules pass untrusted data to these functions, but third-party / external modules may. This issue affects Apache HTTP Server 2.4.48 and earlier.
Source: Apache Software Foundation
Max CVSS
9.8
EPSS Score
0.60%
Published
2021-09-16
Updated
2022-10-05
Malformed requests may cause the server to dereference a NULL pointer. This issue affects Apache HTTP Server 2.4.48 and earlier.
Source: Apache Software Foundation
Max CVSS
7.5
EPSS Score
0.47%
Published
2021-09-16
Updated
2022-10-28
In Apache HTTP Server versions 2.4.0 to 2.4.46 a specially crafted SessionHeader sent by an origin server could cause a heap overflow
Source: Apache Software Foundation
Max CVSS
9.8
EPSS Score
70.60%
Published
2021-06-10
Updated
2022-03-25
Apache HTTP Server versions 2.4.0 to 2.4.46 A specially crafted Cookie header handled by mod_session can cause a NULL pointer dereference and crash, leading to a possible Denial Of Service
Source: Apache Software Foundation
Max CVSS
7.5
EPSS Score
5.22%
Published
2021-06-10
Updated
2021-12-01
67 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!