Severity
7.5HIGH
EPSS
0.4%
top 36.89%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 10
Latest updateAug 11

Description

Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison attacks. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDapache/traffic_server8.0.08.1.5+1
Debiantrafficserver< 8.1.5+ds-1~deb11u1+1

Also affects: Debian Linux 11.0, Fedora 35, 36

🔴Vulnerability Details

3
GHSA
GHSA-mp6g-w483-p43g: Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison att2022-08-11
OSV
CVE-2022-25763: Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison att2022-08-10
CVEList
Improper input validation on HTTP/2 headers2022-08-10

📋Vendor Advisories

1
Debian
CVE-2022-25763: trafficserver - Improper Input Validation vulnerability in HTTP/2 request validation of Apache T...2022
CVE-2022-25763 (HIGH CVSS 7.5) | Improper Input Validation vulnerabi | cvebase.io