Improper Input Validation Affecting apache/httpd package, versions [,2.4.59)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Not Defined
EPSS
0.04% (16th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Input Validation vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-UNMANAGED-APACHEHTTPD-6564972
  • published5 Apr 2024
  • disclosed4 Apr 2024
  • creditOrange Tsai

Introduced: 4 Apr 2024

CVE-2023-38709  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

Upgrade apache/httpd to version 2.4.59 or higher.

Overview

Affected versions of this package are vulnerable to Improper Input Validation due to a faulty input validation flaw in the core of Apache that can allow malicious or exploitable backend/content generators to split HTTP responses. An attacker can manipulate the response headers and body by injecting arbitrary HTTP headers and splitting the response, potentially leading to cache poisoning, cross-site scripting (XSS), and other web vulnerabilities.

CVSS Scores

version 3.1