CVE-2022-26377
Published: 9 June 2022
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
Priority
CVSS 3 base score: 7.5
Status
Package | Release | Status |
---|---|---|
apache2 Launchpad, Ubuntu, Debian |
bionic |
Released
(2.4.29-1ubuntu4.24)
|
focal |
Released
(2.4.41-4ubuntu3.12)
|
|
impish |
Released
(2.4.48-3.1ubuntu3.5)
|
|
jammy |
Released
(2.4.52-1ubuntu4.1)
|
|
trusty |
Released
(2.4.7-1ubuntu4.22+esm5)
|
|
upstream |
Released
(2.4.54-1)
|
|
xenial |
Released
(2.4.18-2ubuntu3.17+esm6)
|
|
Patches: upstream: https://github.com/apache/httpd/commit/f7f15f3d8bfe3032926c8c39eb8434529f680bd4 |
Notes
Author | Note |
---|---|
mdeslaur | the python-pip package bundles requests binaries when built. After updating requests, a no-change rebuild of python-pip is required. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-26377
- https://www.openwall.com/lists/oss-security/2022/06/08/2
- https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2022-26377
- https://ubuntu.com/security/notices/USN-5487-1
- https://ubuntu.com/security/notices/USN-5487-2
- https://ubuntu.com/security/notices/USN-5487-3
- NVD
- Launchpad
- Debian