Apache Traffic Server - HTTP Smuggling and Cache poisoning

medium Nessus Plugin ID 136931

Synopsis

The remote caching server is affected by a HTTP Smuggling and Cache Poisoning vulnerability.

Description

According to the result of a remote check, the target Apache Traffic Server does not have a patch applied to mitigate HTTP Smuggling and HTTP cache poisoning which was put in place in versions greater than 6.2.3 and 7.1.4. A remote unauthenticated attacker could exploit this to gain access to backend resources that they would otherwise not have access to.

Solution

Upgrade to Apache Traffic Server version 6.x users should upgrade to 6.2.3 or later. 7.x versions should upgrade to 7.1.4 or later.

See Also

https://nvd.nist.gov/vuln/detail/CVE-2018-8004

Plugin Details

Severity: Medium

ID: 136931

File Name: apache_traffic_server_cve_2018_8004.nasl

Version: 1.4

Type: remote

Family: Web Servers

Published: 5/28/2020

Updated: 2/28/2022

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:P/A:N

CVSS Score Source: CVE-2018-8004

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:traffic_server

Required KB Items: www/apache_traffic_server

Exploit Ease: No known exploits are available

Patch Publication Date: 2/28/2018

Vulnerability Publication Date: 8/28/2018

Reference Information

CVE: CVE-2018-8004