{"id":"BIT-apache-2023-27522","summary":"Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting","details":"HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.\n\nSpecial characters in the origin response header can truncate/split the response forwarded to the client.","aliases":["CVE-2023-27522","GHSA-vcph-37mh-fqrh"],"modified":"2026-02-11T14:28:59.979921Z","published":"2024-03-06T10:51:05.888Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202309-01"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27522"},{"type":"WEB","url":"https://github.com/advisories/GHSA-vcph-37mh-fqrh"}],"affected":[{"package":{"name":"apache","ecosystem":"Bitnami","purl":"pkg:bitnami/apache"},"ranges":[{"type":"SEMVER","events":[{"introduced":"2.4.30"},{"fixed":"2.4.56"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/apache/BIT-apache-2023-27522.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}],"schema_version":"1.7.3"}