
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was identified in Apache Traffic Server (ATS) versions 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5, tracked as CVE-2020-1944. The vulnerability is related to request smuggling attacks involving Transfer-Encoding and Content-length headers (NVD, CVE).
The vulnerability affects the handling of Transfer-Encoding and Content-length headers in Apache Traffic Server, potentially allowing for request smuggling attacks. The issue was discovered and reported by ZeddYu Lu (Apache Announce).
The vulnerability could potentially enable request smuggling attacks against affected Apache Traffic Server installations (Debian Security).
Users are advised to upgrade to Apache Traffic Server versions 7.1.9, 8.0.6, or later versions to address this vulnerability. For Debian users specifically, the issue has been fixed in version 8.0.2+ds-1+deb10u2 for the stable distribution (buster) (Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."