
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-30631 is an Improper Input Validation vulnerability discovered in Apache Traffic Server. The vulnerability affects Apache Traffic Server versions from 8.0.0 through 9.2.0. The issue specifically relates to the configuration option proxy.config.http.pushmethodenabled, which was found to be non-functional. However, it's worth noting that by default, the PUSH method is blocked in the ip_allow configuration file (NVD).
The vulnerability has been assigned a CVSS v3.1 Base Score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. The vulnerability is classified under CWE-20 (Improper Input Validation) by the Apache Software Foundation (NVD).
The vulnerability affects the availability of the system, as indicated by the CVSS score components showing no impact on confidentiality (C:N) or integrity (I:N), but high impact on availability (A:H) (NVD).
Users are advised to upgrade to patched versions: 8.x users should upgrade to version 8.1.7 or later, while 9.x users should upgrade to version 9.2.1 or later. The vulnerability has been fixed in various distributions including Debian 10 (buster) with version 8.1.7-0+deb10u1, Debian 11 (bullseye) with version 8.1.7+ds-1~deb11u1, and Debian 12 (bookworm) with version 9.2.0+ds-1~deb12u1 (Debian Security, Debian LTS).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."