Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E | Mailing List Vendor Advisory |
https://www.debian.org/security/2021/dsa-4957 | Third Party Advisory |
https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E | Mailing List Vendor Advisory |
https://www.debian.org/security/2021/dsa-4957 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:58
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E - Mailing List, Vendor Advisory | |
References | () https://www.debian.org/security/2021/dsa-4957 - Third Party Advisory |
Information
Published : 2021-06-29 12:15
Updated : 2024-11-21 05:58
NVD link : CVE-2021-27577
Mitre link : CVE-2021-27577
CVE.ORG link : CVE-2021-27577
JSON object : View
Products Affected
apache
- traffic_server
debian
- debian_linux
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')