| Vulnerability Name: | CVE-2021-27577 (CCN-204657) | ||||||||||||
| Assigned: | 2021-06-24 | ||||||||||||
| Published: | 2021-06-24 | ||||||||||||
| Updated: | 2021-09-20 | ||||||||||||
| Summary: | Incorrect handling of url fragment vulnerability of Apache Traffic Server allows an attacker to poison the cache. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||||||||
| Vulnerability Type: | CWE-444 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2021-27577 Source: XF Type: UNKNOWN apache-cve202127577-cache-poisoning(204657) Source: CCN Type: Apache Mailing List, 2021/06/24 23:00:02 Apache Traffic Server is vulnerable to various HTTP/1.x and HTTP/2 attacks Source: MISC Type: Mailing List, Vendor Advisory https://lists.apache.org/thread.html/ra1a41ff92a70d25bf576d7da2590575e8ff430393a3f4a0c34de4277%40%3Cusers.trafficserver.apache.org%3E Source: CCN Type: Apache Web site Apache Traffic Server Source: DEBIAN Type: Third Party Advisory DSA-4957 Source: CCN Type: WhiteSource Vulnerability Database CVE-2021-27577 | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||