CVE-2021-33193

Click the icon to Follow me:- twitterTelegramRedditDiscord

Summary:

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

Reference Links(if available):

  • https://portswigger.net/research/http2
  • https://github.com/apache/httpd/commit/ecebcc035ccd8d0e2984fe41420d9e944f456b3c.patch
  • https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
  • https://lists.apache.org/thread.html/[email protected]%3Ccvs.httpd.apache.org%3E
  • https://security.netapp.com/advisory/ntap-20210917-0004/
  • CVSS Score (if available)

    v2: / MEDIUMAV:N/AC:L/Au:N/C:N/I:P/A:N

    v3: / HIGHCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

    Links to Exploits(if available)

  • Available for Amazon Prime