Apache Traffic Server: Vulnerability in Field Names Allows Request Smuggling and Cache Poisoning
CVE-2023-38522

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
26 July 2024

Summary

Apache Traffic Server allows the acceptance of non-standard characters in HTTP field names, which can lead to the forwarding of malformed requests to origin servers. This behavior poses serious risks, including the potential for request smuggling attacks, where adversaries can manipulate the flow of requests to deceive application logic. Additionally, if the origin servers have their own vulnerabilities, this exploitation could facilitate cache poisoning, impacting the integrity and availability of cached content. Users are advised to upgrade to the patched versions (8.1.11 or 9.2.5) to mitigate these risks.

Affected Version(s)

Apache Traffic Server 8.0.0 <= 8.1.10

Apache Traffic Server 9.0.0 <= 9.2.4

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ben Kallus
.