Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-30631
HistoryJun 14, 2023 - 8:15 a.m.

CVE-2023-30631

2023-06-1408:15:09
Debian Security Bug Tracker
security-tracker.debian.org
17
cve-2023-30631
apache traffic server
input validation

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

71.0%

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.Β  The configuration optionΒ proxy.config.http.push_method_enabled didn’t function.Β  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.003

Percentile

71.0%