Lucene search

K
nvd[email protected]NVD:CVE-2023-30631
HistoryJun 14, 2023 - 8:15 a.m.

CVE-2023-30631

2023-06-1408:15:09
CWE-20
web.nvd.nist.gov
apache traffic server
input validation
configuration
vulnerability
version 8.x
version 9.x

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

68.2%

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.Β  The configuration optionΒ proxy.config.http.push_method_enabled didn’t function.Β  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.

8.x users should upgrade to 8.1.7 or later versions
9.x users should upgrade to 9.2.1 or later versions

Affected configurations

NVD
Node
apachetraffic_serverRange8.0.0–8.1.7
OR
apachetraffic_serverRange9.0.0–9.2.1
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
OR
debiandebian_linuxMatch12.0
Node
fedoraprojectfedoraMatch37
OR
fedoraprojectfedoraMatch38

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.003 Low

EPSS

Percentile

68.2%