Description:
ATS is vulnerable to a HTTP/2 and s3 auth plugin attacks

CVE:
CVE-2023-44487 - HTTP/2 Rapid Reset
CVE-2023-41752 - s3_auth plugin exposes AWSAccessKeyId
CVE-2023-39456 - Malformed HTTP/2 frames can cause an abort

Reported By:
Masakazu Kitajo (CVE-2023-41752)
Akshat Parikh (CVE-2023-39456)

Vendor:
The Apache Software Foundation

Version Affected:
ATS 8.0.0 to 8.1.8
ATS 9.0.0 to 9.2.2 

Mitigation:
8.x users should upgrade to 8.1.9 or later versions
9.x users should upgrade to 9.2.3 or later versions

Users can also disable HTTP/2.  There is a new plugin released that will help 
with blocking users are abusing the HTTP/2 protocol called block_errors:
https://docs.trafficserver.apache.org/admin-guide/plugins/block_errors.en.html

CVE:
https://www.cve.org/CVERecord?id=CVE-2023-44487
https://www.cve.org/CVERecord?id=CVE-2023-41752
https://www.cve.org/CVERecord?id=CVE-2023-39456

-Bryan

Reply via email to