There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
References
Link | Resource |
---|---|
https://github.com/apache/trafficserver/pull/3251 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3231 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3201 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3192 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/105192 | Third Party Advisory VDB Entry |
https://www.debian.org/security/2018/dsa-4282 | Third Party Advisory |
https://lists.apache.org/thread.html/7df882eb09029a4460768a61f88a30c9c30c9dc88e9bcc6e19ba24d5%40%3Cusers.trafficserver.apache.org%3E |
Configurations
History
07 Nov 2023, 03:01
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-08-29 13:29
Updated : 2023-11-07 03:01
NVD link : CVE-2018-8004
Mitre link : CVE-2018-8004
JSON object : View
Products Affected
debian
- debian_linux
apache
- traffic_server
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')