CVE-2023-38709
moderate-risk
Published 2024-04-04
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses. This issue affects Apache HTTP Server: through 2.4.58.
Do I need to act?
~
3.3% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.3/10
High
NETWORK
/ LOW complexity
Affected Products (9)
References (20)
Mailing List
http://seclists.org/fulldisclosure/2024/Jul/18
Vendor Advisory
https://httpd.apache.org/security/vulnerabilities_24.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240415-0013/
Third Party Advisory
https://support.apple.com/kb/HT214119
Mailing List
http://seclists.org/fulldisclosure/2024/Jul/18
Vendor Advisory
https://httpd.apache.org/security/vulnerabilities_24.html
Third Party Advisory
https://security.netapp.com/advisory/ntap-20240415-0013/
Third Party Advisory
https://support.apple.com/kb/HT214119
48
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
7/34 · Low
Exposure
15/34 · Moderate