A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "apache2",
"binary_version": "2.4.29-1ubuntu4.17"
},
{
"binary_name": "apache2-bin",
"binary_version": "2.4.29-1ubuntu4.17"
},
{
"binary_name": "apache2-data",
"binary_version": "2.4.29-1ubuntu4.17"
},
{
"binary_name": "apache2-dev",
"binary_version": "2.4.29-1ubuntu4.17"
},
{
"binary_name": "apache2-ssl-dev",
"binary_version": "2.4.29-1ubuntu4.17"
},
{
"binary_name": "apache2-suexec-custom",
"binary_version": "2.4.29-1ubuntu4.17"
},
{
"binary_name": "apache2-suexec-pristine",
"binary_version": "2.4.29-1ubuntu4.17"
},
{
"binary_name": "apache2-utils",
"binary_version": "2.4.29-1ubuntu4.17"
}
]
}
{
"availability": "No subscription required",
"binaries": [
{
"binary_name": "apache2",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "apache2-bin",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "apache2-data",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "apache2-dev",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "apache2-ssl-dev",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "apache2-suexec-custom",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "apache2-suexec-pristine",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "apache2-utils",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "libapache2-mod-md",
"binary_version": "2.4.41-4ubuntu3.5"
},
{
"binary_name": "libapache2-mod-proxy-uwsgi",
"binary_version": "2.4.41-4ubuntu3.5"
}
]
}