Apache Traffic Server forwards malformed HTTP chunked trailer section to origin servers. This can be utilized for request smuggling and may also lead cache poisoning if the origin servers are vulnerable.
This issue affects Apache Traffic Server: from 8.0.0 through 8.1.10, from 9.0.0 through 9.2.4.
Users can set a new setting (proxy.config.http.drop_chunked_trailers) not to forward chunked trailer section.
Users are recommended to upgrade to version 8.1.11 or 9.2.5, which fixes the issue.
References
Link | Resource |
---|---|
https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0 | Mailing List Vendor Advisory |
https://lists.apache.org/thread/c4mcmpblgl8kkmyt56t23543gp8v56m0 | Mailing List Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2024-07-26 10:15
Updated : 2024-11-21 09:19
NVD link : CVE-2024-35161
Mitre link : CVE-2024-35161
CVE.ORG link : CVE-2024-35161
JSON object : View
Products Affected
apache
- traffic_server
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')