Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.
History

Thu, 06 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Mar 2025 11:45:00 +0000

Type Values Removed Values Added
Description Improper Input Validation vulnerability in Apache Traffic Server. This issue affects Apache Traffic Server: from 8.0.0 through 8.1.11, from 9.0.0 through 9.2.8, from 10.0.0 through 10.0.3. Users are recommended to upgrade to version 9.2.9 or 10.0.4, which fixes the issue.
Title Apache Traffic Server: Request smuggling via pipelining after a chunked message body
Weaknesses CWE-20
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-03-06T11:34:16.289Z

Updated: 2025-03-06T15:35:49.759Z

Reserved: 2024-06-13T15:53:48.274Z

Link: CVE-2024-38311

cve-icon Vulnrichment

Updated: 2025-03-06T15:35:43.530Z

cve-icon NVD

Status : Received

Published: 2025-03-06T12:15:34.157

Modified: 2025-03-06T16:15:45.760

Link: CVE-2024-38311

cve-icon Redhat

No data.