CVE-2021-33193

Published: 16 August 2021

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

Priority

Medium

CVSS 3 base score: 7.5

Status

Package Release Status
apache2
Launchpad, Ubuntu, Debian
Upstream
Released (2.4.48-4)
Ubuntu 21.10 (Impish Indri)
Released (2.4.48-3.1ubuntu2)
Ubuntu 21.04 (Hirsute Hippo)
Released (2.4.46-4ubuntu1.2)
Ubuntu 20.04 LTS (Focal Fossa)
Released (2.4.41-4ubuntu3.5)
Ubuntu 18.04 LTS (Bionic Beaver)
Released (2.4.29-1ubuntu4.17)
Ubuntu 16.04 ESM (Xenial Xerus) Not vulnerable
(http2 disabled in xenial)
Ubuntu 14.04 ESM (Trusty Tahr) Not vulnerable
(code not present)
Patches:
Upstream: https://github.com/apache/httpd/commit/f990e5ecad40b100a8a5c7c1033c46044a9cb244 (trunk)
Upstream: https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c (2.4)

Notes

AuthorNote
mdeslaur
commits for trunk and 2.4 don't match, needs investigation
commit for 2.4 is the one listed in the vulnerability report
as of 2021-08-26, no new version of apache contains the fix

References