|
Message-Id: <D6664661-1212-4DB1-9238-2D50DF8D0332@apache.org> Date: Tue, 12 Feb 2019 15:42:35 -0800 From: Bryan Call <bcall@...che.org> To: oss-security@...ts.openwall.com Subject: [CVE-2018-11783] Apache Traffic Server vulnerability with sslheader plugin CVE-2018-11783: Apache Traffic Server vulnerability with sslheader plugin Reported By: Nikhil Marathe Vendor: The Apache Software Foundation Version Affected: ATS 6.0.0 to 6.2.3 ATS 7.0.0 to 7.1.5 ATS 8.0.0 to 8.0.1 Description: sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. Mitigation: 6.x users should upgrade to 7.1.6, 8.0.2, or later versions 7.x users should upgrade to 7.1.6 or later versions 8.x users should upgrade to 8.0.2 or later versions References: Downloads: https://trafficserver.apache.org/downloads <https://trafficserver.apache.org/downloads> Github Pull Request: https://github.com/apache/trafficserver/pull/4701 <https://github.com/apache/trafficserver/pull/4701> CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783> -Bryan
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.