There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/7df882eb09029a4460768a61f88a30c9c30c9dc88e9bcc6e19ba24d5@%3Cusers.trafficserver.apache.org%3E | Mailing List Vendor Advisory |
https://github.com/apache/trafficserver/pull/3251 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3231 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3201 | Patch Third Party Advisory |
https://github.com/apache/trafficserver/pull/3192 | Patch Third Party Advisory |
http://www.securityfocus.com/bid/105192 | Third Party Advisory VDB Entry |
https://www.debian.org/security/2018/dsa-4282 | Third Party Advisory |
Information
Published : 2018-08-29 06:29
Updated : 2018-11-08 06:13
NVD link : CVE-2018-8004
Mitre link : CVE-2018-8004
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
debian
- debian_linux
apache
- traffic_server