Vulnerability Details : CVE-2018-8040
Pages that are rendered using the ESI plugin can have access to the cookie header when the plugin is configured not to allow access. This affects Apache Traffic Server (ATS) versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions.
Products affected by CVE-2018-8040
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
Threat overview for CVE-2018-8040
Top countries where our scanners detected CVE-2018-8040
Top open port discovered on systems with this issue
80
IPs affected by CVE-2018-8040 402
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2018-8040!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2018-8040
17.94%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-8040
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2018-8040
-
The product exposes a resource to the wrong control sphere, providing unintended actors with inappropriate access to the resource.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-8040
-
https://lists.apache.org/thread.html/36b3df68fe7311965f6bc4630ca413d2aa99d8f1d53affda85ea70d7@%3Cusers.trafficserver.apache.org%3E
Re: [ANNOUNCE] Apache Traffic Server vulnerability with header variable access in the ESI plugin - CVE-2018-8040 - Pony MailMailing List;Vendor Advisory
-
https://www.debian.org/security/2018/dsa-4282
Debian -- Security Information -- DSA-4282-1 trafficserverThird Party Advisory
-
https://lists.apache.org/thread.html/cc7aa2ce1c6f4fe0c6bfef517763cdaad30ec7bcb0115b73f73f3c01@%3Cusers.trafficserver.apache.org%3E
Pony Mail!Mitigation;Mailing List;Vendor Advisory
-
https://github.com/apache/trafficserver/pull/3926
Restrict access to request headers for ESI variables by shukitchan · Pull Request #3926 · apache/trafficserver · GitHubPatch;Third Party Advisory
-
http://www.securityfocus.com/bid/105181
Apache Traffic Server CVE-2018-8040 Security Bypass VulnerabiltyThird Party Advisory;VDB Entry
Jump to