Unrated severityNVD Advisory· Published Apr 4, 2024· Updated Nov 4, 2025
Apache HTTP Server: HTTP response splitting
CVE-2023-38709
Description
Faulty input validation in the core of Apache allows malicious or exploitable backend/content generators to split HTTP responses.
This issue affects Apache HTTP Server: through 2.4.58.
Affected products
53- osv-coords52 versionspkg:bitnami/apachepkg:rpm/almalinux/httpdpkg:rpm/almalinux/httpd-corepkg:rpm/almalinux/httpd-develpkg:rpm/almalinux/httpd-filesystempkg:rpm/almalinux/httpd-manualpkg:rpm/almalinux/httpd-toolspkg:rpm/almalinux/mod_http2pkg:rpm/almalinux/mod_ldappkg:rpm/almalinux/mod_luapkg:rpm/almalinux/mod_mdpkg:rpm/almalinux/mod_proxy_htmlpkg:rpm/almalinux/mod_sessionpkg:rpm/almalinux/mod_sslpkg:rpm/opensuse/apache2-devel&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2&distro=openSUSE%20Leap%2015.5pkg:rpm/opensuse/apache2&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-event&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-manual&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-prefork&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-utils&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/apache2-worker&distro=openSUSE%20Leap%2015.6pkg:rpm/suse/apache2-devel&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP2-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP2-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP2pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/apache2&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/apache2&distro=SUSE%20Manager%20Proxy%204.3pkg:rpm/suse/apache2&distro=SUSE%20Manager%20Server%204.3pkg:rpm/suse/apache2-event&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/apache2-prefork&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Basesystem%2015%20SP6pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5pkg:rpm/suse/apache2-tls13&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5pkg:rpm/suse/apache2-utils&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/apache2-worker&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6
< 2.4.59+ 51 more
- (no CPE)range: < 2.4.59
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 2.4.62-1.el9
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 1.15.7-10.module_el8.10.0+3832+564e7653
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 2.4.62-1.el9
- (no CPE)range: < 1:2.0.8-8.module_el8.6.0+2872+fe0ff7aa
- (no CPE)range: < 1:2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 1:2.4.37-65.module_el8.10.0+3860+a6e26e50
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.51-150200.3.62.1
- (no CPE)range: < 2.4.51-150200.3.62.1
- (no CPE)range: < 2.4.51-150200.3.62.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.51-35.41.1
- (no CPE)range: < 2.4.51-150200.3.62.1
- (no CPE)range: < 2.4.51-150200.3.62.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.51-35.41.1
- (no CPE)range: < 2.4.51-150200.3.62.1
- (no CPE)range: < 2.4.51-150200.3.62.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.51-35.41.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.51-150400.6.17.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.51-35.41.1
- (no CPE)range: < 2.4.51-35.41.1
- (no CPE)range: < 2.4.51-35.41.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- (no CPE)range: < 2.4.58-150600.5.3.1
- Apache Software Foundation/Apache HTTP Serverv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- httpd.apache.org/security/vulnerabilities_24.htmlmitrevendor-advisory
- seclists.org/fulldisclosure/2024/Jul/18mitre
- www.openwall.com/lists/oss-security/2024/04/04/3mitre
- lists.debian.org/debian-lts-announce/2024/05/msg00013.htmlmitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/I2N2NZEX3MR64IWSGL3QGN7KSRUGAEMF/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LX5U34KYGDYPRH3AJ6MDDCBJDWDPXNVJ/mitre
- lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WNV4SZAPVS43DZWNFU7XBYYOZEZMI4ZC/mitre
- security.netapp.com/advisory/ntap-20240415-0013/mitre
- support.apple.com/kb/HT214119mitre
News mentions
0No linked articles in our index yet.