HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response.
This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue.
Users are recommended to upgrade to version 2.4.64, which fixes this issue.
References
Link | Resource |
---|---|
https://httpd.apache.org/security/vulnerabilities_24.html | Vendor Advisory |
Configurations
History
29 Jul 2025, 15:16
Type | Values Removed | Values Added |
---|---|---|
References | () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory | |
CPE | cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:* | |
First Time |
Apache http Server
Apache |
15 Jul 2025, 20:15
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
15 Jul 2025, 13:24
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
10 Jul 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-10 17:15
Updated : 2025-07-29 15:16
NVD link : CVE-2024-42516
Mitre link : CVE-2024-42516
CVE.ORG link : CVE-2024-42516
JSON object : View
Products Affected
apache
- http_server
CWE
CWE-20
Improper Input Validation