CVE-2023-30631

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server. The configuration optionproxy.config.http.push_method_enabled didn't function. However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.

8.x users should upgrade to 8.1.7 or later versions
9.x users should upgrade to 9.2.1 or later versions
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 61%
VendorProductVersion
apachetraffic_server
8.0.0 ≤
𝑥
< 8.1.7
apachetraffic_server
9.0.0 ≤
𝑥
< 9.2.1
debiandebian_linux
10.0
debiandebian_linux
11.0
debiandebian_linux
12.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
trafficserver
bullseye
8.1.10+ds-1~deb11u1
fixed
bullseye (security)
8.1.11+ds-0+deb11u1
fixed
bookworm
9.2.5+ds-0+deb12u1
fixed
bookworm (security)
9.2.5+ds-0+deb12u1
fixed
sid
9.2.5+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
trafficserver
oracular
needs-triage
noble
needs-triage
mantic
ignored
lunar
ignored
kinetic
ignored
jammy
needs-triage
focal
needs-triage
bionic
needs-triage
xenial
needs-triage
trusty
ignored