Miggo Logo

CVE-2023-27522: Apache HTTP Server via mod_proxy_uwsgi HTTP response smuggling

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.7098%
Published
3/7/2023
Updated
9/11/2023
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
uWSGIpip< 2.0.222.0.22

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from mod_proxy_uwsgi's response handling. Commit d753ea76 shows added validation for HTTP response parsing - including checking header lengths, validating HTTP token characters in header names, and proper field content validation. The original code lacked these checks, allowing special characters to manipulate response boundaries. The uwsgi_response function is directly responsible for parsing backend responses and forwarding them to clients, making it the vulnerable entry point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

*TTP R*spons* Smu**lin* vuln*r**ility in *p**** *TTP S*rv*r vi* mo*_proxy_uws*i. T*is issu* *****ts *p**** *TTP S*rv*r *rom *.*.** t*rou** *.*.** *n* t** uWS*I PyPI p**k*** prior to v*rsion *.*.**. Sp**i*l ***r**t*rs in t** ori*in r*spons* *****r **n

Reasoning

T** vuln*r**ility st*ms *rom mo*_proxy_uws*i's r*spons* **n*lin*. *ommit ******** s*ows ***** v*li**tion *or *TTP r*spons* p*rsin* - in*lu*in* ****kin* *****r l*n*t*s, v*li**tin* *TTP tok*n ***r**t*rs in *****r n*m*s, *n* prop*r *i*l* *ont*nt v*li**t