Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Restrict network access to the MCMP protocol port (typically 6666) for systems running Apache mod_proxy_cluster. Configure firewall rules to limit inbound connections to this port only from trusted internal or management networks. This action reduces the attack surface by preventing unauthorized remote access to the vulnerable service. A service reload or restart may be required for firewall changes to take full effect.
Thu, 12 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | A flaw was found in mod_proxy_cluster. This vulnerability, a Carriage Return Line Feed (CRLF) injection in the decodeenc() function, allows a remote attacker to bypass input validation. By injecting CRLF sequences into the cluster configuration, an attacker can corrupt the response body of INFO endpoint responses. Exploitation requires network access to the MCMP protocol port, but no authentication is needed. |
| Title | mod_proxy_cluster: apache mod_proxy_cluster: Response body corruption via CRLF injection | Mod_proxy_cluster: mod_proxy_cluster: response body corruption via crlf injection |
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat jboss Core Services |
|
| CPEs | cpe:/a:redhat:jboss_core_services:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat jboss Core Services |
|
| References |
|
Fri, 06 Mar 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache mod Proxy Cluster |
|
| Vendors & Products |
Apache
Apache mod Proxy Cluster |
Thu, 05 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | No description is available for this CVE. | |
| Title | mod_proxy_cluster: apache mod_proxy_cluster: Response body corruption via CRLF injection | |
| Weaknesses | CWE-93 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-03-12T13:15:53.651Z
Reserved: 2026-02-26T00:17:46.458Z
Link: CVE-2026-3234
Updated: 2026-03-12T13:15:49.984Z
Status : Awaiting Analysis
Published: 2026-03-12T11:15:57.147
Modified: 2026-03-12T21:07:53.427
Link: CVE-2026-3234
OpenCVE Enrichment
Updated: 2026-03-06T15:18:27Z