First published: Wed Nov 03 2021(Updated: )
Improper Input Validation vulnerability in header parsing of Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/trafficserver | 8.0.2+ds-1+deb10u6 8.1.7-0+deb10u2 8.1.7+ds-1~deb11u1 9.2.0+ds-2+deb12u1 9.2.2+ds-1 | |
Apache Traffic Server | >=8.0.0<=8.1.2 | |
Apache Traffic Server | >=9.0.0<=9.1.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2021-37149.
The severity of CVE-2021-37149 is high, with a severity value of 7.5.
CVE-2021-37149 affects Apache Traffic Server versions 8.0.0 to 8.1.2 and 9.0.0 to 9.1.0.
An attacker can exploit CVE-2021-37149 by smuggling requests through improper input validation in header parsing of Apache Traffic Server.
Yes, there are fixes available for CVE-2021-37149. Please refer to the references for more information.