First published: Tue Jun 01 2021(Updated: )
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/jbcs-httpd24-httpd | <0:2.4.51-28.el8 | 0:2.4.51-28.el8 |
redhat/jbcs-httpd24-httpd | <0:2.4.51-28.el7 | 0:2.4.51-28.el7 |
redhat/httpd24-httpd | <0:2.4.34-23.el7.5 | 0:2.4.34-23.el7.5 |
Apache HTTP server | >=2.4.17<=2.4.48 | |
Fedoraproject Fedora | =34 | |
Fedoraproject Fedora | =35 | |
Tenable Tenable.sc | <=5.19.1 | |
Oracle Secure Backup | <18.1.0.1.0 | |
Oracle ZFS Storage Appliance Kit | =8.8 |
This flaw can be mitigated by disabling HTTP/2. More information available at: https://httpd.apache.org/docs/2.4/mod/mod_http2.html
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-33193 is a vulnerability found in Apache httpd mod_h2 that allows a crafted method sent through HTTP/2 to bypass validation and be forwarded by mod_proxy, leading to request splitting or cache poisoning.
The vulnerability affects Apache HTTP Server versions 2.4.17 to 2.4.48.
CVE-2021-33193 has a severity rating of 7.5, which is considered high.
To fix CVE-2021-33193, you should update Apache HTTP Server to version 2.4.49 or newer.
You can find more information about CVE-2021-33193 on the following references: [Link 1](https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch), [Link 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1996514), [Link 3](https://access.redhat.com/errata/RHSA-2022:1915)