CVE-2018-11783
Published: 7 March 2019
sslheaders plugin extracts information from the client certificate and sets headers in the request based on the configuration of the plugin. The plugin doesn't strip the headers from the request in some scenarios. This problem was discovered in versions 6.0.0 to 6.0.3, 7.0.0 to 7.1.5, and 8.0.0 to 8.0.1.
Priority
Status
Package | Release | Status |
---|---|---|
trafficserver Launchpad, Ubuntu, Debian |
impish |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
groovy |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
hirsute |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
jammy |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
lunar |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
bionic |
Needs triage
|
|
cosmic |
Ignored
(end of life)
|
|
disco |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
eoan |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
focal |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
kinetic |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
|
trusty |
Does not exist
(trusty was needs-triage)
|
|
upstream |
Released
(8.0.2+ds-1)
|
|
xenial |
Needs triage
|
|
mantic |
Not vulnerable
(8.0.2+ds-1ubuntu1)
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |