First published: Tue Feb 27 2018(Updated: )
There is a vulnerability in Apache Traffic Server (ATS) 6.2.0 and prior and 7.0.0 and prior with the Host header and line folding. This can have issues when interacting with upstream proxies and the wrong host being used.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | <=6.2.0 | |
Apache Traffic Server | =6.2.1 | |
Apache Traffic Server | =6.2.1-rc0 | |
Apache Traffic Server | =6.2.2 | |
Apache Traffic Server | =6.2.2-rc0 | |
Apache Traffic Server | =7.0.0 | |
Apache Traffic Server | =7.0.0-rc0 | |
Apache Traffic Server | =7.0.0-rc1 | |
Apache Traffic Server | =7.0.0-rc2 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-5660 is rated as high with a score of 8.6.
To mitigate CVE-2017-5660, upgrade to Apache Traffic Server version 8.0.2+ds-1+deb10u6 or later.
CVE-2017-5660 affects Apache Traffic Server versions 6.2.0 and prior, as well as 7.0.0 and prior.
CVE-2017-5660 is categorized under CWE-20, which involves improper input validation.
Yes, CVE-2017-5660 may cause issues with upstream proxies leading to the wrong host being used.