Description
Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-4957-1 | trafficserver security update |
EUVD |
EUVD-2021-19407 | Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1. |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T23:25:30.615Z
Reserved: 2021-05-11T00:00:00.000Z
Link: CVE-2021-32565
No data.
Status : Modified
Published: 2021-06-29T12:15:08.573
Modified: 2024-11-21T06:07:16.830
Link: CVE-2021-32565
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD