BIT-apache-2026-28780

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/apache/BIT-apache-2026-28780.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-apache-2026-28780
Aliases
  • CVE-2026-28780
Published
2026-05-07T08:38:43.651Z
Modified
2026-05-07T09:15:33.579998Z
Summary
Apache HTTP Server: buffer overflow in mod_proxy_ajp via ajp_msg_check_header()
Details

Heap-based Buffer Overflow vulnerability in modproxyajp of Apache HTTP Server. If modproxyajp connects to a malicious AJP server this AJP server can send a malicious AJP message back to modproxyajp and cause it to write 4 attacker controlled bytes after the end of a heap based buffer.

This issue affects Apache HTTP Server: through 2.4.66.

Users are recommended to upgrade to version 2.4.67, which fixes the issue.

Database specific
{
    "cpes": [
        "cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*"
    ],
    "severity": "Critical"
}
References

Affected packages

Bitnami / apache

Package

Name
apache
Purl
pkg:bitnami/apache

Severity

  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.4.67

Database specific

source
"https://github.com/bitnami/vulndb/tree/main/data/apache/BIT-apache-2026-28780.json"