
Cloud Vulnerability DB
A community-led vulnerabilities database
Apache Traffic Server (ATS) was found to be vulnerable to request smuggling when handling malformed chunked messages. The vulnerability, identified as CVE-2024-53868, affects Apache Traffic Server versions from 9.2.0 through 9.2.9 and from 10.0.0 through 10.0.4. The issue was discovered by Jeppe Bonde Weikop and was publicly disclosed on April 2, 2025 (OSS Security, CVE MITRE).
The vulnerability is classified as CWE-444 (Inconsistent Interpretation of HTTP Requests - HTTP Request/Response Smuggling), which occurs when malformed chunked messages are processed by the server. This type of vulnerability typically allows attackers to manipulate how HTTP requests are interpreted between different systems (NVD NIST).
Request smuggling vulnerabilities can potentially lead to security bypasses, cache poisoning, and unauthorized access to sensitive information. The exact impact depends on the specific deployment configuration and the presence of downstream systems (Debian Security).
Users of Apache Traffic Server 9.x are recommended to upgrade to version 9.2.10 or later, while users of 10.x should upgrade to version 10.0.5 or later. These versions contain the necessary fixes to address the vulnerability (OSS Security).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."