Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
https://httpd.apache.org/security/vulnerabilities_24.html
https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-04
https://support.apple.com/kb/HT214119
https://security.netapp.com/advisory/ntap-20240415-0013/
https://lists.fedoraproject.org/archives/list/[email protected]/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/
https://lists.fedoraproject.org/archives/list/[email protected]/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/
https://lists.fedoraproject.org/archives/list/[email protected]/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/
https://lists.debian.org/debian-lts-announce/2024/05/msg00013.html
http://www.openwall.com/lists/oss-security/2024/04/04/3
http://seclists.org/fulldisclosure/2024/Jul/18
Source: Mitre, NVD
Published: 2024-04-04
Updated: 2024-11-05
Base Score: 9.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:N
Severity: High
Base Score: 7.3
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
EPSS: 0.0347