7.5
CWE
20
Advisory Published
Updated

CVE-2023-30631: Input Validation

First published: Wed Jun 14 2023(Updated: )

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions

Credit: security@apache.org security@apache.org

Affected SoftwareAffected VersionHow to fix
Apache Traffic Server>=8.0.0<8.1.7
Apache Traffic Server>=9.0.0<9.2.1
debian/trafficserver<=8.0.2+ds-1+deb10u6
8.1.7-0+deb10u2
8.1.7+ds-1~deb11u1
9.2.0+ds-2+deb12u1
9.2.2+ds-1
Debian Debian Linux=10.0
Debian Debian Linux=11.0
Debian Debian Linux=12.0
Fedoraproject Fedora=37
Fedoraproject Fedora=38

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-30631?

    CVE-2023-30631 refers to an Improper Input Validation vulnerability in Apache Traffic Server.

  • What is the severity of CVE-2023-30631?

    CVE-2023-30631 has a severity rating of 7.5 (high).

  • What is affected by CVE-2023-30631?

    Apache Traffic Server versions 8.0.0 to 8.1.7 and versions 9.0.0 to 9.2.1 are affected by CVE-2023-30631.

  • How does CVE-2023-30631 impact the configuration option proxy.config.http.push_method_enabled?

    CVE-2023-30631 causes the configuration option proxy.config.http.push_method_enabled to not function properly in Apache Traffic Server.

  • How can I fix CVE-2023-30631?

    To fix CVE-2023-30631, update Apache Traffic Server to version 8.1.7 or 9.2.2, or apply the appropriate remedy patches provided by the Debian LTS or Fedora Project.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203