Information Exposure Affecting trafficserver package, versions <8.0.2+ds-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.06% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-TRAFFICSERVER-338104
  • published27 Feb 2019
  • disclosed7 Mar 2019

Introduced: 27 Feb 2019

CVE-2018-11783  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade Debian:unstable trafficserver to version 8.0.2+ds-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream trafficserver package and not the trafficserver package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.