CVE-2023-30631Improper Input Validation in Apache Traffic Server

Severity
7.5HIGHNVD
EPSS
0.7%
top 28.81%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 14

Description

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server. The configuration option proxy.config.http.push_method_enabled didn't function. However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDapache/traffic_server8.0.08.1.7+1

Also affects: Debian Linux 10.0, 11.0, 12.0, Fedora 37, 38

🔴Vulnerability Details

4
GHSA
GHSA-5rc2-qffv-3c8p: Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server2023-06-14
OSV
CVE-2023-30631: Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server2023-06-14
CVEList
Apache Traffic Server: Configuration option to block the PUSH method in ATS didn't work2023-06-14
OSV
golang-1.18 vulnerabilities2023-04-25

📋Vendor Advisories

1
Debian
CVE-2023-30631: trafficserver - Improper Input Validation vulnerability in Apache Software Foundation Apache Tra...2023
CVE-2023-30631 — Improper Input Validation in Apache | cvebase