Description

A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed.

INFO

Published Date :

2026-03-12T10:54:25.456Z

Last Modified :

2026-03-12T13:15:53.651Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2026-3234 vulnerability.

Vendors Products
Apache
  • Mod Proxy Cluster
Redhat
  • Enterprise Linux
  • Jboss Core Services

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact