Vulnerability Details CVE-2023-27522
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55.
Special characters in the origin response header can truncate/split the response forwarded to the client.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.007
EPSS Ranking 71.0%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2023-27522
-
cpe:2.3:a:apache:http_server:2.4.30
-
cpe:2.3:a:apache:http_server:2.4.31
-
cpe:2.3:a:apache:http_server:2.4.32
-
cpe:2.3:a:apache:http_server:2.4.33
-
cpe:2.3:a:apache:http_server:2.4.34
-
cpe:2.3:a:apache:http_server:2.4.35
-
cpe:2.3:a:apache:http_server:2.4.36
-
cpe:2.3:a:apache:http_server:2.4.37
-
cpe:2.3:a:apache:http_server:2.4.38
-
cpe:2.3:a:apache:http_server:2.4.39
-
cpe:2.3:a:apache:http_server:2.4.40
-
cpe:2.3:a:apache:http_server:2.4.41
-
cpe:2.3:a:apache:http_server:2.4.42
-
cpe:2.3:a:apache:http_server:2.4.43
-
cpe:2.3:a:apache:http_server:2.4.44
-
cpe:2.3:a:apache:http_server:2.4.45
-
cpe:2.3:a:apache:http_server:2.4.46
-
cpe:2.3:a:apache:http_server:2.4.47
-
cpe:2.3:a:apache:http_server:2.4.48
-
cpe:2.3:a:apache:http_server:2.4.49
-
cpe:2.3:a:apache:http_server:2.4.50
-
cpe:2.3:a:apache:http_server:2.4.51
-
cpe:2.3:a:apache:http_server:2.4.52
-
cpe:2.3:a:apache:http_server:2.4.53
-
cpe:2.3:a:apache:http_server:2.4.54
-
cpe:2.3:a:apache:http_server:2.4.55
-
-
cpe:2.3:a:unbit:uwsgi:0.9.5
-
cpe:2.3:a:unbit:uwsgi:0.9.5.1
-
cpe:2.3:a:unbit:uwsgi:0.9.6
-
cpe:2.3:a:unbit:uwsgi:0.9.6.1
-
cpe:2.3:a:unbit:uwsgi:0.9.6.2
-
cpe:2.3:a:unbit:uwsgi:0.9.7
-
cpe:2.3:a:unbit:uwsgi:0.9.7.1
-
cpe:2.3:a:unbit:uwsgi:0.9.7.2
-
cpe:2.3:a:unbit:uwsgi:0.9.8
-
cpe:2.3:a:unbit:uwsgi:0.9.8.1
-
cpe:2.3:a:unbit:uwsgi:0.9.8.2
-
cpe:2.3:a:unbit:uwsgi:0.9.8.3
-
cpe:2.3:a:unbit:uwsgi:0.9.9
-
cpe:2.3:a:unbit:uwsgi:1.0
-
cpe:2.3:a:unbit:uwsgi:1.0.1
-
cpe:2.3:a:unbit:uwsgi:1.1
-
cpe:2.3:a:unbit:uwsgi:1.2
-
cpe:2.3:a:unbit:uwsgi:1.3
-
cpe:2.3:a:unbit:uwsgi:1.4
-
cpe:2.3:a:unbit:uwsgi:1.4.1
-
cpe:2.3:a:unbit:uwsgi:1.4.10
-
cpe:2.3:a:unbit:uwsgi:1.4.2
-
cpe:2.3:a:unbit:uwsgi:1.4.3
-
cpe:2.3:a:unbit:uwsgi:1.4.4
-
cpe:2.3:a:unbit:uwsgi:1.4.5
-
cpe:2.3:a:unbit:uwsgi:1.4.6
-
cpe:2.3:a:unbit:uwsgi:1.4.7
-
cpe:2.3:a:unbit:uwsgi:1.4.8
-
cpe:2.3:a:unbit:uwsgi:1.4.9
-
cpe:2.3:a:unbit:uwsgi:1.9
-
cpe:2.3:a:unbit:uwsgi:1.9.1
-
cpe:2.3:a:unbit:uwsgi:1.9.10
-
cpe:2.3:a:unbit:uwsgi:1.9.11
-
cpe:2.3:a:unbit:uwsgi:1.9.12
-
cpe:2.3:a:unbit:uwsgi:1.9.13
-
cpe:2.3:a:unbit:uwsgi:1.9.14
-
cpe:2.3:a:unbit:uwsgi:1.9.15
-
cpe:2.3:a:unbit:uwsgi:1.9.16
-
cpe:2.3:a:unbit:uwsgi:1.9.17
-
cpe:2.3:a:unbit:uwsgi:1.9.17.1
-
cpe:2.3:a:unbit:uwsgi:1.9.18.1
-
cpe:2.3:a:unbit:uwsgi:1.9.18.2
-
cpe:2.3:a:unbit:uwsgi:1.9.19
-
cpe:2.3:a:unbit:uwsgi:1.9.2
-
cpe:2.3:a:unbit:uwsgi:1.9.20
-
cpe:2.3:a:unbit:uwsgi:1.9.21
-
cpe:2.3:a:unbit:uwsgi:1.9.21.1
-
cpe:2.3:a:unbit:uwsgi:1.9.3
-
cpe:2.3:a:unbit:uwsgi:1.9.4
-
cpe:2.3:a:unbit:uwsgi:1.9.5
-
cpe:2.3:a:unbit:uwsgi:1.9.6
-
cpe:2.3:a:unbit:uwsgi:1.9.7
-
cpe:2.3:a:unbit:uwsgi:1.9.8
-
cpe:2.3:a:unbit:uwsgi:1.9.9
-
cpe:2.3:a:unbit:uwsgi:2.0
-
cpe:2.3:a:unbit:uwsgi:2.0.1
-
cpe:2.3:a:unbit:uwsgi:2.0.10
-
cpe:2.3:a:unbit:uwsgi:2.0.11
-
cpe:2.3:a:unbit:uwsgi:2.0.11.1
-
cpe:2.3:a:unbit:uwsgi:2.0.11.2
-
cpe:2.3:a:unbit:uwsgi:2.0.12
-
cpe:2.3:a:unbit:uwsgi:2.0.13
-
cpe:2.3:a:unbit:uwsgi:2.0.13.1
-
cpe:2.3:a:unbit:uwsgi:2.0.14
-
cpe:2.3:a:unbit:uwsgi:2.0.15
-
cpe:2.3:a:unbit:uwsgi:2.0.16
-
cpe:2.3:a:unbit:uwsgi:2.0.17
-
cpe:2.3:a:unbit:uwsgi:2.0.17.1
-
cpe:2.3:a:unbit:uwsgi:2.0.18
-
cpe:2.3:a:unbit:uwsgi:2.0.19
-
cpe:2.3:a:unbit:uwsgi:2.0.19.1
-
cpe:2.3:a:unbit:uwsgi:2.0.2
-
cpe:2.3:a:unbit:uwsgi:2.0.20
-
cpe:2.3:a:unbit:uwsgi:2.0.21
-
cpe:2.3:a:unbit:uwsgi:2.0.3
-
cpe:2.3:a:unbit:uwsgi:2.0.4
-
cpe:2.3:a:unbit:uwsgi:2.0.5
-
cpe:2.3:a:unbit:uwsgi:2.0.5.1
-
cpe:2.3:a:unbit:uwsgi:2.0.6
-
cpe:2.3:a:unbit:uwsgi:2.0.7
-
cpe:2.3:a:unbit:uwsgi:2.0.8
-
cpe:2.3:a:unbit:uwsgi:2.0.9
-
cpe:2.3:o:debian:debian_linux:10.0