49 lines
1.8 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-38709",
"sourceIdentifier": "security@apache.org",
"published": "2024-04-04T20:15:08.047",
"lastModified": "2024-06-10T17:16:12.647",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.\n\nThis issue affects Apache HTTP Server: through 2.4.58.\n"
},
{
"lang": "es",
"value": "La validaci\u00f3n de entrada defectuosa en el n\u00facleo de Apache permite que generadores de contenido/backend maliciosos o explotables dividan las respuestas HTTP. Este problema afecta al servidor HTTP Apache: hasta 2.4.58."
}
],
"metrics": {},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2024/04/04/3",
"source": "security@apache.org"
},
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org"
},
{
"url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html",
"source": "security@apache.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/",
"source": "security@apache.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/",
"source": "security@apache.org"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/",
"source": "security@apache.org"
},
{
"url": "https://security.netapp.com/advisory/ntap-20240415-0013/",
"source": "security@apache.org"
}
]
}