Vulnerability Description
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | >= 2.4.30, < 2.4.56 |
| Debian | Debian Linux | 10.0 |
| Unbit | Uwsgi | < 2.0.22 |
Related Weaknesses (CWE)
References
- https://httpd.apache.org/security/vulnerabilities_24.htmlVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.htmlThird Party Advisory
- https://security.gentoo.org/glsa/202309-01Third Party Advisory
- https://httpd.apache.org/security/vulnerabilities_24.htmlVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.htmlThird Party Advisory
- https://security.gentoo.org/glsa/202309-01Third Party Advisory
FAQ
What is CVE-2023-27522?
CVE-2023-27522 is a vulnerability with a CVSS score of 7.5 (HIGH). HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header ca...
How severe is CVE-2023-27522?
CVE-2023-27522 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-27522?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Debian Debian Linux, Unbit Uwsgi.