CVE-2022-31778

Severity
7.5HIGH
EPSS
2.7%
top 14.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedAug 10
Latest updateAug 11

Description

Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 8.0.0 to 9.0.2.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDapache/traffic_server8.0.08.1.4+1
Debiantrafficserver< 8.1.5+ds-1~deb11u1+1

Also affects: Debian Linux 11.0

🔴Vulnerability Details

3
GHSA
GHSA-w7rf-qxv9-mpv7: Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an attacker to poison the cache2022-08-11
OSV
CVE-2022-31778: Improper Input Validation vulnerability in handling the Transfer-Encoding header of Apache Traffic Server allows an attacker to poison the cache2022-08-10
CVEList
Transfer-Encoding not treated as hop-by-hop2022-08-10

📋Vendor Advisories

1
Debian
CVE-2022-31778: trafficserver - Improper Input Validation vulnerability in handling the Transfer-Encoding header...2022
CVE-2022-31778 (HIGH CVSS 7.5) | Improper Input Validation vulnerabi | cvebase.io