
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-47184 is a vulnerability affecting Apache Traffic Server (ATS), a high-performance caching proxy server. The vulnerability is classified as an Exposure of Sensitive Information to an Unauthorized Actor, affecting Apache Traffic Server versions from 8.0.0 to 9.2.0. The vulnerability was disclosed and tracked in late 2022 (NVD).
The vulnerability is related to the TRACE method, which could be exploited to disclose network information. The severity of this vulnerability has been rated as HIGH with a CVSS v3.1 base score of 7.5 (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), indicating a significant impact on confidentiality but no impact on integrity or availability (NVD).
The primary impact of this vulnerability is the potential disclosure of sensitive network information through the TRACE method. This could allow unauthorized actors to gather intelligence about the network infrastructure, potentially facilitating further attacks (Debian Security).
The vulnerability has been fixed in multiple versions across different distributions. Apache Traffic Server version 9.2.1 includes patches for this vulnerability. For Debian systems, fixes were released in version 8.1.7+ds-1~deb11u1 for bullseye and version 9.2.0+ds-1~deb12u1 for bookworm. Fedora has also released updates to version 9.2.1 for both Fedora 37 and 38 (Fedora Update, Debian Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."