First published: Thu Apr 03 2025(Updated: )
Apache Traffic Server allows request smuggling if chunked messages are malformed. This issue affects Apache Traffic Server: from 9.2.0 through 9.2.9, from 10.0.0 through 10.0.4. Users are recommended to upgrade to version 9.2.10 or 10.0.5, which fixes the issue.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Server | >=9.2.0<=9.2.9>=10.0.0<10.0.4 | |
Apache Traffic Server | >=9.0.0<9.2.10 | |
Apache Traffic Server | >=10.0.0<10.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-53868 has been classified as a medium severity vulnerability affecting Apache Traffic Server.
To fix CVE-2024-53868, upgrade Apache Traffic Server to version 9.2.10 or 10.0.5.
CVE-2024-53868 affects Apache Traffic Server versions from 9.2.0 through 9.2.9 and from 10.0.0 through 10.0.4.
CVE-2024-53868 is a request smuggling vulnerability that arises from malformed chunked messages.
There is no official workaround for CVE-2024-53868; upgrading to the patched versions is the recommended action.