Lucene search

K
cvelistApacheCVELIST:CVE-2023-30631
HistoryJun 14, 2023 - 7:44 a.m.

CVE-2023-30631 Apache Traffic Server: Configuration option to block the PUSH method in ATS didn't work

2023-06-1407:44:55
CWE-20
apache
www.cve.org
4
apache traffic server
configuration option
improper input validation
push method
apache software foundation
vulnerability
ip_allow
upgrade
version 8.1.7
version 9.2.1

EPSS

0.003

Percentile

71.0%

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.Β  The configuration optionΒ proxy.config.http.push_method_enabled didn’t function.Β  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.

8.x users should upgrade to 8.1.7 or later versions
9.x users should upgrade to 9.2.1 or later versions

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Apache Traffic Server",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "lessThanOrEqual": "9.2.0",
        "status": "affected",
        "version": "8.0.0",
        "versionType": "semver"
      }
    ]
  }
]

EPSS

0.003

Percentile

71.0%