Description
A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.
INFO
Published Date :
2026-03-12T10:54:25.456Z
Last Modified :
2026-03-12T13:15:53.651Z
Source :
redhat
AFFECTED PRODUCTS
The following products are affected by CVE-2026-3234 vulnerability.
| Vendors | Products |
|---|---|
| Apache |
|
| Redhat |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-3234.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact