cve/2023/CVE-2023-27522.md

21 lines
972 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-27522](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-27522)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20HTTP%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=2.4.30%3C%3D%202.4.55%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Responses%20('HTTP%20Response%20Smuggling')&color=brighgreen)
### Description
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.Special characters in the origin response header can truncate/split the response forwarded to the client.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/ARPSyndicate/cvemon
2024-06-22 09:37:59 +00:00
- https://github.com/EzeTauil/Maquina-Upload
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/xonoxitron/cpe2cve