Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <D6664661-1212-4DB1-9238-2D50DF8D0332@apache.org>
Date: Tue, 12 Feb 2019 15:42:35 -0800
From: Bryan Call <bcall@...che.org>
To: oss-security@...ts.openwall.com
Subject: [CVE-2018-11783] Apache Traffic Server vulnerability with sslheader
 plugin

CVE-2018-11783: Apache Traffic Server vulnerability with sslheader plugin

Reported By:
Nikhil Marathe

Vendor:
The Apache Software Foundation

Version Affected:
ATS 6.0.0 to 6.2.3
ATS 7.0.0 to 7.1.5
ATS 8.0.0 to 8.0.1

Description:
sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin.  The plugin doesn't strip the headers from the request in some scenarios.

Mitigation:
6.x users should upgrade to 7.1.6, 8.0.2, or later versions
7.x users should upgrade to 7.1.6 or later versions
8.x users should upgrade to 8.0.2 or later versions

References:
	Downloads:
		https://trafficserver.apache.org/downloads <https://trafficserver.apache.org/downloads>
	Github Pull Request:
		https://github.com/apache/trafficserver/pull/4701 <https://github.com/apache/trafficserver/pull/4701>
	CVE:
		https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11783>

-Bryan

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.