First published: Wed Nov 03 2021(Updated: )
Improper input validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=8.0.0<=8.1.2 | |
Apache Traffic Server | >=9.0.0<=9.0.1 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-37148 is an improper input validation vulnerability in the header parsing of Apache Traffic Server.
CVE-2021-37148 allows an attacker to smuggle requests in Apache Traffic Server versions 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1.
Apache Traffic Server versions 8.0.0 to 8.1.2 and 9.0.0 to 9.0.1 are affected by CVE-2021-37148.
CVE-2021-37148 has a severity value of 7.5, which is considered high.
To fix CVE-2021-37148, update Apache Traffic Server to versions 8.0.2+ds-1+deb10u6, 8.1.7-0+deb10u2, 8.1.7+ds-1~deb11u1, 9.2.0+ds-2+deb12u1, or 9.2.2+ds-1, depending on your distribution.