{"id":"CVE-2023-27522","summary":"Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting","details":"HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.\n\nSpecial characters in the origin response header can truncate/split the response forwarded to the client.","aliases":["BIT-apache-2023-27522","GHSA-vcph-37mh-fqrh"],"modified":"2026-05-15T11:54:37.217372659Z","published":"2023-03-07T15:09:30.122Z","related":["ALSA-2023:5050","ALSA-2023:6403","SUSE-SU-2023:0764-1","SUSE-SU-2023:0799-1","SUSE-SU-2023:1573-1","SUSE-SU-2023:1658-1","openSUSE-SU-2024:12776-1","openSUSE-SU-2024:13346-1"],"database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/27xxx/CVE-2023-27522.json","unresolved_ranges":[{"source":"AFFECTED_FIELD","extracted_events":[{"introduced":"2.4.30"},{"last_affected":"2.4.55"}]},{"source":"DESCRIPTION","extracted_events":[{"introduced":"2.4.30"},{"fixed":"2.4.55"}]}],"cwe_ids":["CWE-444"],"cna_assigner":"apache"},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/27xxx/CVE-2023-27522.json"},{"type":"ADVISORY","url":"https://httpd.apache.org/security/vulnerabilities_24.html"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2023-27522"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202309-01"}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"}]}