Apache Traffic Server 4.x < 4.2.0 XSS

Medium Nessus Network Monitor Plugin ID 8623

Synopsis

The remote caching server contains a cross-site scripting vulnerability.

Description

Apache Traffic Server versions 4.x prior to 4.2.0 are affected by a cross-site scripting vulnerability due to improperly sanitized user-supplied input. By sending a specially crafted host header, a remote, unauthenticated attacker can execute arbitrary script code in the victim's browser in the context of the affected site.

Solution

Upgrade to Apache Traffic Server 4.2.0 or later.

See Also

http://seclists.org/oss-sec/2014/q4/545

https://issues.apache.org/jira/browse/TS-3095

http://trafficserver.apache.org

Plugin Details

Severity: Medium

ID: 8623

File Name: 8623.prm

Family: Web Servers

Published: 2015/02/04

Modified: 2016/11/18

Dependencies: 9787

Nessus ID: 79624

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:traffic_server

Patch Publication Date: 2014/11/07

Vulnerability Publication Date: 2014/11/06

Reference Information

BID: 70970