
Cloud Vulnerability DB
A community-led vulnerabilities database
HTTP response splitting vulnerability in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server to split the HTTP response. This vulnerability was initially described as CVE-2023-38709, but the patch included in Apache HTTP Server 2.4.59 did not completely address the issue. The vulnerability affects Apache HTTP Server versions 2.4.0 through 2.4.63 (Apache Security).
The vulnerability is classified as having moderate severity and involves HTTP response splitting in the core functionality of Apache HTTP Server. The issue specifically relates to the handling of Content-Type response headers, where malicious manipulation can lead to HTTP response splitting attacks. The vulnerability persisted due to an incomplete fix attempt in version 2.4.59 (SecurityOnline).
When exploited, this vulnerability could allow attackers to inject malicious headers or content into responses served to clients, potentially bypassing security controls. The impact is particularly significant in environments where response headers can be manipulated by hosted or proxied applications (SecurityOnline).
Users are strongly recommended to upgrade to Apache HTTP Server version 2.4.64, which contains the complete fix for this vulnerability. This version addresses the HTTP response splitting issue that remained exploitable in previous versions, including the incomplete fix in version 2.4.59 (Apache Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."