Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.
This issue affects Apache HTTP Server: through 2.4.58.
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "38"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "39"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "40"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "14.6"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-38709.json"