First published: Tue Oct 17 2023(Updated: )
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 8.1.8, from 9.0.0 through 9.2.2. Users are recommended to upgrade to version 8.1.9 or 9.2.3, which fixes the issue.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=8.0.0<8.1.9 | |
Apache Traffic Server | >=9.0.0<9.2.3 | |
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
debian/trafficserver | <=8.0.2+ds-1+deb10u6<=8.1.7+ds-1~deb11u1 | 8.1.7-0+deb10u3 8.1.9+ds-1~deb11u1 9.2.3+ds-1+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41752 is a vulnerability in Apache Traffic Server that allows the exposure of sensitive information to an unauthorized actor.
CVE-2023-41752 affects Apache Traffic Server versions 8.0.0 through 8.1.8 and versions 9.0.0 through 9.2.2.
CVE-2023-41752 has a severity rating of 7.5 (high).
To fix CVE-2023-41752, it is recommended to upgrade to Apache Traffic Server version 8.1.9 or 9.2.3.
You can find more information about CVE-2023-41752 on the following references: [Reference 1](https://lists.apache.org/thread/5py8h42mxfsn8l1wy6o41xwhsjlsd87q), [Reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JIZSEFC3YKCGABA2BZW6ZJRMDZJMB7PJ/), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZKQSIKIAT5TJ3WSLU3RDBQ35YX4GY4V3/)