CVE-2023-30631

EUVD-2023-34995
Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.

8.x users should upgrade to 8.1.7 or later versions
9.x users should upgrade to 9.2.1 or later versions
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 67%
Affected Products (NVD)
VendorProductVersion
apachetraffic_server
8.0.0 ≤
𝑥
< 8.1.7
apachetraffic_server
9.0.0 ≤
𝑥
< 9.2.1
debiandebian_linux
10.0
debiandebian_linux
11.0
debiandebian_linux
12.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
trafficserver
bookworm
9.2.5+ds-0+deb12u1
fixed
bookworm (security)
9.2.5+ds-0+deb12u1
fixed
bullseye
8.1.10+ds-1~deb11u1
fixed
bullseye (security)
8.1.11+ds-0+deb11u1
fixed
sid
9.2.5+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
trafficserver
bionic
needs-triage
focal
needs-triage
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
oracular
needs-triage
trusty
ignored
xenial
needs-triage