Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2024-53868

Опубликовано: 03 апр. 2025
Источник: debian
EPSS Низкий

Описание

Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
trafficserverunfixedpackage

Примечания

  • https://www.openwall.com/lists/oss-security/2025/04/02/4

  • https://github.com/apache/trafficserver/commit/f266206adb95951436a21850cef2ad8e9e4a28cf

  • https://github.com/apache/trafficserver/commit/3d2f29c88f9b073cb0fd3b9c7f85430e2170acbb (9.2.10-rc0)

EPSS

Процентиль: 65%
0.00501
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
10 месяцев назад

Apache Traffic Server allows request smuggling if chunked messages are malformed. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue.

CVSS3: 7.5
nvd
10 месяцев назад

Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue.

CVSS3: 7.5
github
10 месяцев назад

Apache Traffic Server allows request smuggling if chunked messages are malformed.  This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue.

CVSS3: 6.5
fstec
10 месяцев назад

Уязвимость веб-сервера Apache Traffic Server, связанная с недостатками обработки заголовков HTTP-запросов, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)

EPSS

Процентиль: 65%
0.00501
Низкий