Apache Traffic Server 4.x < 4.2.0 XSS

low Nessus Network Monitor Plugin ID 8623

Synopsis

The remote caching server contains a cross-site scripting vulnerability.

Description

Apache Traffic Server versions 4.x prior to 4.2.0 are affected by a cross-site scripting vulnerability due to improperly sanitized user-supplied input. By sending a specially crafted host header, a remote, unauthenticated attacker can execute arbitrary script code in the victim's browser in the context of the affected site.

Solution

Upgrade to Apache Traffic Server 4.2.0 or later.

See Also

http://seclists.org/oss-sec/2014/q4/545

https://issues.apache.org/jira/browse/TS-3095

http://trafficserver.apache.org

Plugin Details

Severity: Low

ID: 8623

Family: Web Servers

Published: 2/4/2015

Updated: 3/6/2019

Nessus ID: 79624

Risk Information

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.5

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:traffic_server

Patch Publication Date: 11/7/2014

Vulnerability Publication Date: 11/6/2014

Reference Information

BID: 70970