CVE-2023-30631

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

13 Feb 2025, 17:16

Type Values Removed Values Added
CWE CWE-20
Summary Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions
References (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List, Vendor Advisory () https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List, Vendor Advisory
References (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - Mailing List, Third Party Advisory
References (MISC) https://www.debian.org/security/2023/dsa-5435 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5435 - Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - Mailing List
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - Mailing List

01 Feb 2024, 14:50

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
References (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List, Vendor Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - Mailing List
References (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - Mailing List, Third Party Advisory
References (MISC) https://www.debian.org/security/2023/dsa-5435 - (MISC) https://www.debian.org/security/2023/dsa-5435 - Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - Mailing List
First Time Fedoraproject fedora
Fedoraproject
Debian
Debian debian Linux

30 Jun 2023, 02:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html -

23 Jun 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ -

22 Jun 2023, 04:15

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-20
References
  • (MISC) https://www.debian.org/security/2023/dsa-5435 -

21 Jun 2023, 21:05

Type Values Removed Values Added
CPE cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
CWE CWE-20 NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List
First Time Apache
Apache traffic Server

14 Jun 2023, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-14 08:15

Updated : 2025-02-13 17:16


NVD link : CVE-2023-30631

Mitre link : CVE-2023-30631


JSON object : View

Products Affected

debian

  • debian_linux

apache

  • traffic_server

fedoraproject

  • fedora
CWE

No CWE.