Vulnerability Details : CVE-2018-8004
There are multiple HTTP smuggling and cache poisoning issues when clients making malicious requests interact with Apache Traffic Server (ATS). This affects versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
Products affected by CVE-2018-8004
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
Threat overview for CVE-2018-8004
Top countries where our scanners detected CVE-2018-8004
Top open port discovered on systems with this issue
80
IPs affected by CVE-2018-8004 393
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2018-8004!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-8004
0.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 83 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-8004
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.0
|
MEDIUM | AV:N/AC:L/Au:S/C:N/I:P/A:N |
8.0
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2018-8004
-
The product acts as an intermediary HTTP agent (such as a proxy or firewall) in the data flow between two entities such as a client and server, but it does not interpret malformed HTTP requests or responses in ways that are consistent with how the messages will be processed by those entities that are at the ultimate destination.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-8004
-
http://www.securityfocus.com/bid/105192
Apache Traffic Server CVE-2018-8004 Multiple Security VulnerabilitiesThird Party Advisory;VDB Entry
-
https://www.debian.org/security/2018/dsa-4282
Debian -- Security Information -- DSA-4282-1 trafficserverThird Party Advisory
-
https://github.com/apache/trafficserver/pull/3231
Validate Content-Length headers for incoming requests by bryancall · Pull Request #3231 · apache/trafficserver · GitHubPatch;Third Party Advisory
-
https://github.com/apache/trafficserver/pull/3201
Close the connection when returning a 400 error response by bryancall · Pull Request #3201 · apache/trafficserver · GitHubPatch;Third Party Advisory
-
https://lists.apache.org/thread.html/7df882eb09029a4460768a61f88a30c9c30c9dc88e9bcc6e19ba24d5@%3Cusers.trafficserver.apache.org%3E
Pony Mail!Mailing List;Vendor Advisory
-
https://github.com/apache/trafficserver/pull/3192
Return 400 if there is whitespace after the field name and before the colon by bryancall · Pull Request #3192 · apache/trafficserver · GitHubPatch;Third Party Advisory
-
https://github.com/apache/trafficserver/pull/3251
Drain the request body if there is a cache hit by bryancall · Pull Request #3251 · apache/trafficserver · GitHubPatch;Third Party Advisory
Jump to