First published: Wed Aug 09 2023(Updated: )
Improper input validation vulnerability on the range header in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: through 9.2.1.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=8.0.0<=8.1.7 | |
Apache Traffic Server | >=9.0.0<=9.2.1 | |
debian/trafficserver | <=8.0.2+ds-1+deb10u6<=8.1.7+ds-1~deb11u1 | 8.1.7-0+deb10u3 8.1.9+ds-1~deb11u1 9.2.3+ds-1+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-47185 is an improper input validation vulnerability in Apache Traffic Server.
Apache Traffic Server versions 8.0.0 through 8.1.7 and versions 9.0.0 through 9.2.1 are affected by CVE-2022-47185.
CVE-2022-47185 has a severity rating of 7.5 (high).
CVE-2022-47185 allows attackers to exploit improper input validation on the range header in Apache Traffic Server, potentially leading to remote code execution or denial of service.
Yes, you can find references for CVE-2022-47185 at the following links: [Reference 1](https://lists.apache.org/thread/jsl6dfdgs1mjjo1mbtyflyjr7xftswhc) and [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BOTOM2MFKOLK46Q3BQHO662HTPZFRQUC/)