First published: Tue Mar 07 2023(Updated: )
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server from 2.4.30 through 2.4.55 and the uWSGI PyPI package prior to version 2.0.22. Special characters in the origin response header can truncate/split the response forwarded to the client.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache HTTP server | >=2.4.30<=2.4.55 | |
Debian Debian Linux | =10.0 | |
Unbit uWSGI | <2.0.22 | |
pip/uWSGI | <2.0.22 | 2.0.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-27522 is an HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi.
Apache HTTP Server versions 2.4.30 through 2.4.55 and the uWSGI PyPI package prior to version 2.0.22 are affected.
By using special characters in the origin response header, an attacker can truncate/split the response forwarded to the client.
CVE-2023-27522 has a severity rating of 7.5 (High).
You can find more information about CVE-2023-27522 on the NIST NVD, Apache HTTP Server security vulnerabilities page, and the Debian LTS-Announce mailing list.