2024-12-15 03:03:56 +00:00

108 lines
3.0 KiB
JSON

{
"id": "CVE-2022-37436",
"sourceIdentifier": "security@apache.org",
"published": "2023-01-17T20:15:11.670",
"lastModified": "2024-11-21T07:14:59.487",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client."
},
{
"lang": "es",
"value": "Antes de Apache HTTP Server 2.4.55, un backend malicioso pod\u00eda provocar que los encabezados de respuesta se truncaran antes de tiempo, lo que provocaba que algunos encabezados se incorporaran al cuerpo de la respuesta. Si los encabezados posteriores tienen alg\u00fan prop\u00f3sito de seguridad, no ser\u00e1n interpretados por el cliente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "security@apache.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-113"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-436"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*",
"versionEndExcluding": "2.4.55",
"matchCriteriaId": "E1AD829E-486E-4D6E-B323-F0FA299E587D"
}
]
}
]
}
],
"references": [
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "security@apache.org",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202309-01",
"source": "security@apache.org"
},
{
"url": "https://httpd.apache.org/security/vulnerabilities_24.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes",
"Vendor Advisory"
]
},
{
"url": "https://security.gentoo.org/glsa/202309-01",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}