First published: Wed Aug 29 2018(Updated: )
Pages that are rendered using the ESI plugin can have access to the cookie header when the plugin is configured not to allow access. This affects Apache Traffic Server (ATS) versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=6.0.0<=6.2.2 | |
Apache Traffic Server | >=7.0.0<=7.1.3 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2018-8040.
The severity of CVE-2018-8040 is medium.
Apache Traffic Server versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3 are affected by CVE-2018-8040.
To resolve this issue, users running Apache Traffic Server 6.x should upgrade to version 6.2.3 or later versions.
More information about CVE-2018-8040 can be found at the following references: [reference 1](https://www.openwall.com/lists/oss-security/2018/08/29/2), [reference 2](https://github.com/apache/trafficserver/pull/3926), [reference 3](https://github.com/apache/trafficserver/commit/cea07c03274807c1588dbdf03baa1537d958c92f).