First published: Tue Jun 29 2021(Updated: )
Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=7.0.0<=7.1.12 | |
Apache Traffic Server | >=8.0.0<=8.1.1 | |
Apache Traffic Server | >=9.0.0<=9.0.1 | |
Debian Debian Linux | =8.0 | |
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-27577.
The severity level of CVE-2021-27577 is high.
The vulnerability affects Apache Traffic Server version 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, and 9.0.0 to 9.0.1.
An attacker can exploit this vulnerability to poison the cache of Apache Traffic Server.
The recommended versions to fix this vulnerability are 8.0.2+ds-1+deb10u6, 8.1.7-0+deb10u2, 8.1.7+ds-1~deb11u1, 9.2.0+ds-2+deb12u1, and 9.2.2+ds-1.