CVE-2024-42516

HTTP response splitting in the core of Apache HTTP Server allows an attacker who can manipulate the Content-Type response headers of applications hosted or proxied by the server can split the HTTP response. This vulnerability was described as CVE-2023-38709 but the patch included in Apache HTTP Server 2.4.59 did not address the issue. Users are recommended to upgrade to version 2.4.64, which fixes this issue.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

History

29 Jul 2025, 15:16

Type Values Removed Values Added
References () https://httpd.apache.org/security/vulnerabilities_24.html - () https://httpd.apache.org/security/vulnerabilities_24.html - Vendor Advisory
CPE cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*
First Time Apache http Server
Apache

15 Jul 2025, 20:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5

15 Jul 2025, 13:24

Type Values Removed Values Added
Summary
  • (es) La división de la respuesta HTTP en el núcleo de Apache HTTP Server permite que un atacante que manipule los encabezados de respuesta Content-Type de las aplicaciones alojadas o proxyizadas por el servidor pueda dividir la respuesta HTTP. Esta vulnerabilidad se describió como CVE-2023-38709, pero el parche incluido en Apache HTTP Server 2.4.59 no solucionó el problema. Se recomienda a los usuarios actualizar a la versión 2.4.64, que corrige este problema.

10 Jul 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-10 17:15

Updated : 2025-07-29 15:16


NVD link : CVE-2024-42516

Mitre link : CVE-2024-42516

CVE.ORG link : CVE-2024-42516


JSON object : View

Products Affected

apache

  • http_server
CWE
CWE-20

Improper Input Validation