CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
71.0%
trafficserver is vulnerable to Improper Input Validation. The configuration option proxy.config.http.push_method_enabled
doesn’t function. However, by default the PUSH
method is blocked in the ip_allow
configuration file.
lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs
lists.debian.org/debian-lts-announce/2023/06/msg00037.html
lists.fedoraproject.org/archives/list/[email protected]/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/
lists.fedoraproject.org/archives/list/[email protected]/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/
security-tracker.debian.org/tracker/CVE-2023-30631
www.debian.org/security/2023/dsa-5435