Apache HTTP Server 2.4.59 Resolved HTTP Response Splitting in Modules
CVE-2024-24795 Published on April 4, 2024

Apache HTTP Server: HTTP Response Splitting in multiple modules
HTTP Response splitting in multiple modules in Apache HTTP Server allows an attacker that can inject malicious response headers into backend applications to cause an HTTP desynchronization attack. Users are recommended to upgrade to version 2.4.59, which fixes this issue.

Vendor Advisory NVD

Vulnerability Analysis

CVE-2024-24795 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be low. considered to have a small impact on confidentiality and integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
LOW

Timeline

Reported to security team

Weakness Types

What is a HTTP Response Splitting Vulnerability?

The software receives data from an upstream component, but does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.

CVE-2024-24795 has been classified to as a HTTP Response Splitting vulnerability or weakness.

What is a HTTP Request Smuggling Vulnerability?

When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it.

CVE-2024-24795 has been classified to as a HTTP Request Smuggling vulnerability or weakness.


Products Associated with CVE-2024-24795

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2024-24795 are published in these products:

 
 
 
 
 
 
 
 
 

Affected Versions

Apache Software Foundation Apache HTTP Server:

Exploit Probability

EPSS
1.12%
Percentile
78.00%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.