Rewterz
Rewterz Threat Advisory – Multiple Fortinet Vulnerabilities
November 4, 2021
Rewterz
Rewterz Threat Alert – SNAKE Ransomware – Active IOCs
November 4, 2021

Rewterz Threat Advisory – Multiple Apache Vulnerabilities

Severity

Medium

Analysis Summary

CVE-2021-43082

Apache Traffic Server is vulnerable to a buffer overflow, caused by improper bounds checking by the stats-over-http plugin. By sending a specially-crafted request, a remote attacker could overflow a buffer and execute arbitrary code on the system.

CVE-2021-41585

Apache Traffic Server is vulnerable to a denial of service, caused by an improper input validation flaw when accepting socket connections. By sending a specially-crafted request, a remote attacker could exploit this vulnerability to make the server stop accepting new connections, and results in a denial of service condition.

CVE-2021-38161

Apache Traffic Server is vulnerable to a man-in-the-middle attack, caused by an improper authentication flaw in the TLS origin verification. An attacker could exploit this vulnerability to launch a man-in-the-middle attack and gain access to the communication channel between endpoints to obtain sensitive information or further compromise the system.

CVE-2021-37149

Apache Traffic Server is vulnerable to HTTP request smuggling, caused by improper input validation in header parsing. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.

CVE-2021-37148

Apache Traffic Server is vulnerable to HTTP request smuggling, caused by improper input validation in header parsing. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.

CVE-2021-37147

Apache Traffic Server is vulnerable to HTTP request smuggling, caused by improper input validation in header parsing. By sending a specially-crafted HTTP(S) transfer-encoding request header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.

Impact

  • Buffer Overflow
  • Denial of Service
  • Unauthorized Access

Affected Vendors

Apache

Affected Products

  • Apache Traffic Server 9.1.0
  • Apache Traffic Server 5.0.0
  • Apache Traffic Server 8.0.0
  • Apache Traffic Server 8.0.8
  • Apache Traffic Server 9.0.0
  • Apache Traffic Server 8.1.2

Remediation

Upgrade to the latest version of Apache Traffic Server, available from the Apache Web site.

https://trafficserver.apache.org/