Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
2024-04-04T20:15:08.047
2025-06-30T12:59:08.537
Analyzed
CVSSv3.1: 7.3 (HIGH)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | http_server | < 2.4.59 | Yes |
Operating System | debian | debian_linux | 10.0 | Yes |
Operating System | fedoraproject | fedora | 38 | Yes |
Operating System | fedoraproject | fedora | 39 | Yes |
Operating System | fedoraproject | fedora | 40 | Yes |
Application | netapp | ontap | 9 | Yes |
Application | netapp | ontap_tools | 10 | Yes |
Operating System | broadcom | fabric_operating_system | - | Yes |
Operating System | apple | macos | < 14.6 | Yes |