CVE-2021-33193

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:tenable:tenable.sc:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:oracle:secure_backup:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:zfs_storage_appliance_kit:8.8:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-08-16 08:15

Updated : 2023-11-07 03:35


NVD link : CVE-2021-33193

Mitre link : CVE-2021-33193

CVE.ORG link : CVE-2021-33193


JSON object : View

Products Affected

apache

  • http_server

oracle

  • secure_backup
  • zfs_storage_appliance_kit

fedoraproject

  • fedora

tenable

  • tenable.sc