CVE-2023-30631

Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*

History

13 Feb 2025, 17:16

Type Values Removed Values Added
Summary (en) Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions (en) Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.  The configuration option proxy.config.http.push_method_enabled didn't function.  However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0. 8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions

21 Nov 2024, 08:00

Type Values Removed Values Added
References () https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List, Vendor Advisory () https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - Mailing List
References () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - Mailing List () https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - Mailing List
References () https://www.debian.org/security/2023/dsa-5435 - Third Party Advisory () https://www.debian.org/security/2023/dsa-5435 - Third Party Advisory

01 Feb 2024, 14:50

Type Values Removed Values Added
First Time Fedoraproject fedora
Debian
Debian debian Linux
Fedoraproject
CPE cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ - Mailing List
References (MISC) https://www.debian.org/security/2023/dsa-5435 - (MISC) https://www.debian.org/security/2023/dsa-5435 - Third Party Advisory
References (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ - Mailing List
References (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List, Vendor Advisory
References (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html - Mailing List, Third Party Advisory

30 Jun 2023, 02:15

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/06/msg00037.html -

23 Jun 2023, 03:15

Type Values Removed Values Added
References
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6GDCBNFDDW6ULW7CACJCPENI7BVDHM5O/ -
  • (MISC) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FGWXNAEEVRUZ5JG4EJAIIFC3CI7LFETV/ -

22 Jun 2023, 04:15

Type Values Removed Values Added
CWE NVD-CWE-noinfo CWE-20
References
  • (MISC) https://www.debian.org/security/2023/dsa-5435 -

21 Jun 2023, 21:05

Type Values Removed Values Added
References (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - (MISC) https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs - Mailing List
First Time Apache
Apache traffic Server
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
CWE CWE-20 NVD-CWE-noinfo

14 Jun 2023, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-14 08:15

Updated : 2025-02-13 17:16


NVD link : CVE-2023-30631

Mitre link : CVE-2023-30631

CVE.ORG link : CVE-2023-30631


JSON object : View

Products Affected

debian

  • debian_linux

apache

  • traffic_server

fedoraproject

  • fedora
CWE
CWE-20

Improper Input Validation

NVD-CWE-noinfo