Description:
ATS is vulnerable to malformed requests, and also has ACL issues

CVE:
CVE-2024-38311 - Request smuggling via pipelining after a chunked message
body
CVE-2024-56195 - Intercept plugins are not access controlled
CVE-2024-56196 - ACL is not fully compatible with older versions
CVE-2024-56202 - Expect header field can unreasonably retain resource

Reported By:
Ben Kallus (CVE-2024-38311)
Masaori Koshiba (CVE-2024-56195)
Chris McFarlen (CVE-2024-56196)
David Carlin (CVE-2024-56202)

Vendor:
The Apache Software Foundation

Version Affected:
ATS 9.0.0 to 9.2.8 (CVE-2024-38311, CVE-2024-56195, CVE-2024-56202)
ATS 10.0.0 to 10.0.3 (CVE-2024-38311, CVE-2024-56195, CVE-2024-56196,
CVE-2024-56202)

Mitigation:
9.x users should upgrade to 9.2.9 or later versions
10.x users should upgrade to 10.0.4 or later versions

CVE:
https://www.cve.org/CVERecord?id=CVE-2024-38311
https://www.cve.org/CVERecord?id=CVE-2024-56195
https://www.cve.org/CVERecord?id=CVE-2024-56196
https://www.cve.org/CVERecord?id=CVE-2024-56202

Reply via email to