
Cloud Vulnerability DB
A community-led vulnerabilities database
A faulty input validation vulnerability was discovered in the core of Apache HTTP Server through version 2.4.58. The vulnerability (CVE-2023-38709) allows malicious or exploitable backend/content generators to split HTTP responses. The issue was first reported by Orange Tsai (@orange8361) from DEVCORE and was publicly disclosed on April 4, 2024 (OSS-SECURITY, [APACHE-HTTPD](https://httpd.apache.org/security/vulnerabilities24.html)).
The vulnerability stems from insufficient sanitization of response headers before an HTTP response is sent. When a malicious backend can insert headers such as Content-Type, Content-Encoding, or other headers, it can result in HTTP response splitting. The issue has been assigned a CVSS v3.1 base score of 6.8 (Moderate) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:N (RED-HAT).
The vulnerability can lead to information disclosure, HTTP response splitting attacks, and potential HTTP desynchronization attacks. When successfully exploited, it allows attackers to manipulate or split HTTP responses, which could result in security bypass, cache poisoning, or other security implications (DEBIAN-SEC).
The vulnerability has been fixed in Apache HTTP Server version 2.4.59. Users are recommended to upgrade to this version or apply appropriate patches provided by their distribution vendors. For systems where immediate upgrade is not possible, no specific workarounds have been provided by Apache, and the currently available options may not meet standard security criteria (RED-HAT).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."