Vulnerability Description
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Http Server | < 2.4.59 |
| Debian | Debian Linux | 10.0 |
| Fedoraproject | Fedora | 38 |
| Netapp | Ontap | 9 |
| Netapp | Ontap Tools | 10 |
| Broadcom | Fabric Operating System | - |
| Apple | Macos | < 14.6 |
Related Weaknesses (CWE)
References
- http://seclists.org/fulldisclosure/2024/Jul/18Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2024/04/04/3Mailing ListThird Party Advisory
- https://httpd.apache.org/security/vulnerabilities_24.htmlVendor Advisory
- https://lists.debian.org/debian-lts-announce/2024/05/msg00013.htmlMailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://lists.fedoraproject.org/archives/list/[email protected]Mailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20240415-0013/Third Party Advisory
- https://support.apple.com/kb/HT214119Third Party Advisory
- http://seclists.org/fulldisclosure/2024/Jul/18Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2024/04/04/3Mailing ListThird Party Advisory
- http://www.openwall.com/lists/oss-security/2025/07/10/2
- http://www.openwall.com/lists/oss-security/2025/07/10/3
- https://httpd.apache.org/security/vulnerabilities_24.htmlVendor Advisory
- https://lists.debian.org/debian-lts-announce/2024/05/msg00013.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2023-38709?
CVE-2023-38709 is a vulnerability with a CVSS score of 7.3 (HIGH). Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
How severe is CVE-2023-38709?
CVE-2023-38709 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-38709?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Http Server, Debian Debian Linux, Fedoraproject Fedora, Netapp Ontap, Netapp Ontap Tools.