You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by fi...@apache.org on 2023/03/07 17:49:57 UTC

[httpd-site] branch main updated: remove autolink garbage from description

This is an automated email from the ASF dual-hosted git repository.

fielding pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/httpd-site.git


The following commit(s) were added to refs/heads/main by this push:
     new b2a20cf  remove autolink garbage from description
b2a20cf is described below

commit b2a20cf9e17f478eb67c4995b296dd2cbb40d0e3
Author: Roy T. Fielding <fi...@gbiv.com>
AuthorDate: Tue Mar 7 09:49:48 2023 -0800

    remove autolink garbage from description
---
 content/security/json/CVE-2023-25690.json | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)

diff --git a/content/security/json/CVE-2023-25690.json b/content/security/json/CVE-2023-25690.json
index c27f6f0..3fe4e30 100644
--- a/content/security/json/CVE-2023-25690.json
+++ b/content/security/json/CVE-2023-25690.json
@@ -52,13 +52,13 @@
       ],
       "descriptions": [
         {
-          "value": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.\n\n For example, something like:\n\n\n\n\nRewrite [...]
+          "value": "Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.\n\n\n\n\nConfigurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution.\n\n For example, something like:\n\n\n\n\nRewrite [...]
           "lang": "en",
           "supportingMedia": [
             {
               "type": "text/html",
               "base64": false,
-              "value": "<div>Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.</div><div><br></div><div><div>Configurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example [...]
+              "value": "<div>Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack.</div><div><br></div><div><div>Configurations are affected when mod_proxy is enabled along with some form of RewriteRule\n or ProxyPassMatch in which a non-specific pattern matches\n some portion of the user-supplied request-target (URL) data and is then\n re-inserted into the proxied request-target using variable \nsubstitution. For example [...]
             }
           ]
         }