CVE-2021-33193
Published: 16 August 2021
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
bionic |
Released
(2.4.29-1ubuntu4.17)
|
focal |
Released
(2.4.41-4ubuntu3.5)
|
|
hirsute |
Released
(2.4.46-4ubuntu1.2)
|
|
impish |
Released
(2.4.48-3.1ubuntu2)
|
|
jammy |
Released
(2.4.48-3.1ubuntu2)
|
|
trusty |
Not vulnerable
(code not present)
|
|
upstream |
Released
(2.4.48-4)
|
|
xenial |
Not vulnerable
(http2 disabled in xenial)
|
Notes
Author | Note |
---|---|
mdeslaur | commits for trunk and 2.4 don't match, needs investigation commit for 2.4 is the one listed in the vulnerability report as of 2021-08-26, no new version of apache contains the fix |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33193
- https://portswigger.net/research/http2
- https://ubuntu.com/security/notices/USN-5090-1
- NVD
- Launchpad
- Debian