Severity: low

Description:

In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script 
that calls r:parsebody(0) may cause a denial of service due to no default limit 
on possible input size.

Credit:

The Apache HTTP Server project would like to thank Ronald Crane (Zippenhop LLC) 
for reporting this issue

References:

https://httpd.apache.org/security/vulnerabilities_24.html

Reply via email to