
Cloud Vulnerability DB
A community-led vulnerabilities database
HTTP Response Smuggling vulnerability was discovered in Apache HTTP Server via modproxyuwsgi module. The vulnerability affects Apache HTTP Server versions from 2.4.30 through 2.4.55. The issue was identified and reported by Dimas Fariski Setyawan Putra (nyxsorcerer) (Apache Security).
The vulnerability occurs when special characters in the origin response header can truncate or split the response forwarded to the client through the modproxyuwsgi module. This could lead to HTTP response smuggling attacks, potentially allowing attackers to manipulate how responses are interpreted (Apache Security).
The vulnerability could allow attackers to perform HTTP response smuggling attacks, which might lead to response splitting, cache poisoning, or bypass of security controls. This could potentially expose sensitive information or lead to other security implications (NVD).
The vulnerability was fixed in Apache HTTP Server version 2.4.56. Users are recommended to upgrade their Apache HTTP Server installations to version 2.4.56 or later to address this security issue (Apache Security, Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."