Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.
This issue affects Apache HTTP Server: through 2.4.58.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
04 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
|
| References | () https://lists.fedoraproject.org/archives/list/[email protected]/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/[email protected]/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/ - Mailing List, Third Party Advisory | |
| References | () https://lists.fedoraproject.org/archives/list/[email protected]/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/ - Mailing List, Third Party Advisory |
Information
Published : 2024-04-04 20:15
Updated : 2025-11-04 22:15
NVD link : CVE-2023-38709
Mitre link : CVE-2023-38709
CVE.ORG link : CVE-2023-38709
JSON object : View
Products Affected
debian
- debian_linux
netapp
- ontap
- ontap_tools
apache
- http_server
fedoraproject
- fedora
broadcom
- fabric_operating_system
apple
- macos
CWE
CWE-1284
Improper Validation of Specified Quantity in Input
