Description
A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3351-1 | apache2 security update |
EUVD |
EUVD-2021-19907 | A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48. |
Ubuntu USN |
USN-5090-1 | Apache HTTP Server vulnerabilities |
References
History
Tue, 15 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 01 May 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debian
Debian debian Linux |
|
| CPEs | cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* | |
| Vendors & Products |
Debian
Debian debian Linux |
Subscriptions
Apache
Subscribe
Http Server
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Fedoraproject
Subscribe
Fedora
Subscribe
Oracle
Subscribe
Secure Backup
Subscribe
Zfs Storage Appliance Kit
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Jboss Core Services
Subscribe
Rhel Software Collections
Subscribe
Tenable
Subscribe
Tenable.sc
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T23:42:20.253Z
Reserved: 2021-05-19T00:00:00.000Z
Link: CVE-2021-33193
No data.
Status : Analyzed
Published: 2021-08-16T08:15:11.480
Modified: 2025-05-01T15:40:12.163
Link: CVE-2021-33193
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN