CVE Vulnerabilities

CVE-2016-8743

Published: Jul 27, 2017 | Modified: Apr 20, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
4.3 MODERATE
AV:N/AC:M/Au:N/C:N/I:P/A:N
RedHat/V3
4 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Apache HTTP Server, in all releases prior to 2.2.32 and 2.4.25, was liberal in the whitespace accepted from requests and sent in response lines and headers. Accepting these different behaviors represented a security concern when httpd participates in any chain of proxies or interacts with back-end application servers, either through mod_proxy or using conventional CGI mechanisms, and may result in request smuggling, response splitting and cache pollution.

Affected Software

NameVendorStart VersionEnd Version
Http_serverApache2.2.0 (including)2.2.31 (including)
Http_serverApache2.4.1 (including)2.4.23 (including)
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-httpd-0:2.4.23-120.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el6*
JBoss Core Services on RHEL 6RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el6*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.23-120.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-mod_security-0:2.9.1-19.GA.jbcs.el7*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-openssl-1:1.0.2h-13.jbcs.el7*
Red Hat Enterprise Linux 6RedHathttpd-0:2.2.15-60.el6_9.4*
Red Hat Enterprise Linux 7RedHathttpd-0:2.4.6-45.el7_3.4*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHathttpd24-httpd-0:2.4.25-9.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHathttpd24-httpd-0:2.4.25-9.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHathttpd24-httpd-0:2.4.25-9.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHathttpd24-httpd-0:2.4.25-9.el7*
Text-Only JBCSRedHat*
Apache2Ubuntuesm-infra-legacy/trusty*
Apache2Ubuntuesm-infra/xenial*
Apache2Ubuntuprecise*
Apache2Ubuntutrusty*
Apache2Ubuntutrusty/esm*
Apache2Ubuntuupstream*
Apache2Ubuntuxenial*
Apache2Ubuntuyakkety*

References