Apache Traffic Server 4.x < 4.2.0 XSS

low Nessus Network Monitor Plugin ID 8623

Synopsis

The remote caching server contains a cross-site scripting vulnerability.

Description

Apache Traffic Server versions 4.x prior to 4.2.0 are affected by a cross-site scripting vulnerability due to improperly sanitized user-supplied input. By sending a specially crafted host header, a remote, unauthenticated attacker can execute arbitrary script code in the victim's browser in the context of the affected site.

Solution

Upgrade to Apache Traffic Server 4.2.0 or later.

See Also

http://seclists.org/oss-sec/2014/q4/545

https://issues.apache.org/jira/browse/TS-3095

http://trafficserver.apache.org

Plugin Details

Severity: Low

ID: 8623

Family: Web Servers

Published: 2/4/2015

Updated: 3/6/2019

Nessus ID: 79624

Vulnerability Information

CPE: cpe:/a:apache:traffic_server

Patch Publication Date: 11/7/2014

Vulnerability Publication Date: 11/6/2014

Reference Information

BID: 70970