CVE Vulnerabilities

CVE-2021-33193

Published: Aug 16, 2021 | Modified: May 01, 2025
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

Affected Software

NameVendorStart VersionEnd Version
Debian_linuxDebian10.0 (including)10.0 (including)
JBoss Core Services for RHEL 8RedHatjbcs-httpd24-httpd-0:2.4.51-28.el8jbcs*
JBoss Core Services on RHEL 7RedHatjbcs-httpd24-httpd-0:2.4.51-28.el7jbcs*
Red Hat Enterprise Linux 8RedHathttpd:2.4-8060020220321163517.d63f516d*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHathttpd24-httpd-0:2.4.34-23.el7.5*
Text-Only JBCSRedHathttpd*
Apache2Ubuntubionic*
Apache2Ubuntudevel*
Apache2Ubuntuesm-infra/bionic*
Apache2Ubuntuesm-infra/focal*
Apache2Ubuntufocal*
Apache2Ubuntuhirsute*
Apache2Ubuntuimpish*
Apache2Ubuntujammy*
Apache2Ubuntutrusty*
Apache2Ubuntuupstream*
Apache2Ubuntuxenial*

References