There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/105192 | Third Party Advisory VDB Entry |
https://github.com/apache/trafficserver/pull/3192 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3201 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3231 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3251 | Patch Third Party Advisory |
https://lists.apache.org/thread.html/7df882eb09029a4460768a61f88a30c9c30c9dc88e9bcc6e19ba24d5%40%3Cusers.trafficserver.apache.org%3E | |
https://www.debian.org/security/2018/dsa-4282 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-08-29 13:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-8004
Mitre link : CVE-2018-8004
CVE.ORG link : CVE-2018-8004
JSON object : View
Products Affected
debian
- debian_linux
apache
- traffic_server
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')