CVE-2022-36760: Apache HTTP Server HTTP Request Smuggling Vulnerability
The Apache Software Foundation has released a new version of its HTTP Server web server to patch a pair of security defects, which allow an attacker to smuggle requests, cause the process to crash, and trigger HTTP response splitting. According to the latest market share data from Netcraft, the Apache HTTP Server continues to be dominant on the internet.
The patch provides cover for three documented security vulnerabilities: CVE-2006-20001, CVE-2022-36760, and CVE-2022-37436.
Apache Software Foundation wrote in its advisory:
- moderate: mod_dav out of bounds read, or write of zero byte (CVE-2006-20001) – A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash.
-
moderate: Apache HTTP Server: mod_proxy_ajp Possible request smuggling (CVE-2022-36760) – Inconsistent Interpretation of HTTP Requests (‘HTTP Request Smuggling’) vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to.
-
moderate: Apache HTTP Server: mod_proxy prior to 2.4.55 allows a backend to trigger HTTP response splitting (CVE-2022-37436) – Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
The issues were identified by ZeddYu_Lu from Qi’anxin Research Institute of Legendsec at Qi’anxin Group and Dimas Fariski Setyawan Putra (@nyxsorcerer). It affects version Apache HTTP Server 2.4.54 and earlier, and it was patched recently with the release of version 2.4.55.