7.5

CVE-2021-33193

Exploit

A crafted method sent through HTTP/2 will bypass validation and be forwarded by mod_proxy, which can lead to request splitting or cache poisoning. This issue affects Apache HTTP Server 2.4.17 to 2.4.48.

Data is provided by the National Vulnerability Database (NVD)
DebianDebian Linux Version10.0
ApacheHTTP Server Version >= 2.4.17 < 2.4.49
FedoraprojectFedora Version34
FedoraprojectFedora Version35
TenableTenable.Sc Version <= 5.19.1
OracleSecure Backup Version < 18.1.0.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.94% 0.754
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
https://portswigger.net/research/http2
Third Party Advisory
Exploit