Name | CVE-2018-8040 |
Description | Pages that are rendered using the ESI plugin can have access to the cookie header when the plugin is configured not to allow access. This affects Apache Traffic Server (ATS) versions 6.0.0 to 6.2.2 and 7.0.0 to 7.1.3. To resolve this issue users running 6.x should upgrade to 6.2.3 or later versions and 7.x users should upgrade to 7.1.4 or later versions. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4282-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
trafficserver (PTS) | buster (security), buster, buster (lts) | 8.1.7-0+deb10u4 | fixed |
| bullseye | 8.1.10+ds-1~deb11u1 | fixed |
| bullseye (security) | 8.1.11+ds-0+deb11u1 | fixed |
| bookworm | 9.2.4+ds-0+deb12u1 | fixed |
| bookworm (security) | 9.2.5+ds-0+deb12u1 | fixed |
| sid | 9.2.5+ds-1 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://www.openwall.com/lists/oss-security/2018/08/29/2
https://github.com/apache/trafficserver/pull/3926
https://github.com/apache/trafficserver/commit/cea07c03274807c1588dbdf03baa1537d958c92f