NA

CVE-2023-30631

Published: 14/06/2023 Updated: 01/02/2024
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 up to and including 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions

Vulnerable Product Search on Vulmon Subscribe to Product

apache traffic server

debian debian linux 10.0

debian debian linux 11.0

debian debian linux 12.0

fedoraproject fedora 37

fedoraproject fedora 38

Vendor Advisories

Debian Bug report logs - #1038248 trafficserver: CVE-2022-47184 CVE-2023-30631 CVE-2023-33933 Package: src:trafficserver; Maintainer for src:trafficserver is Jean Baptiste Favre <debian@jbfavreorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Fri, 16 Jun 2023 18:45:01 UTC Severity: important Tags: se ...
Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in information disclosure or denial of service For the stable distribution (bookworm), these problems have been fixed in version 920+ds-2+deb12u1 This is a no change rebuild of the update from DSA-5435-1 with a corrected vers ...
Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in information disclosure or denial of service For the oldstable distribution (bullseye), these problems have been fixed in version 817+ds-1~deb11u1 For the stable distribution (bookworm), these problems have been fixed in ve ...