Apache Traffic Server HTTP/2 Input Val Flaw Cache Poisoning (8.0.0-9.1.2)
CVE-2022-25763 Published on August 10, 2022
Improper input validation on HTTP/2 headers
Improper Input Validation vulnerability in HTTP/2 request validation of Apache Traffic Server allows an attacker to create smuggle or cache poison attacks. This issue affects Apache Traffic Server 8.0.0 to 9.1.2.
Vulnerability Analysis
CVE-2022-25763 can be exploited with network access, requires user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a HTTP Request Smuggling Vulnerability?
When malformed or abnormal HTTP requests are interpreted by one or more entities in the data flow between the user and the web server, such as a proxy or firewall, they can be interpreted inconsistently, allowing the attacker to "smuggle" a request to one device without the other device being aware of it.
CVE-2022-25763 has been classified to as a HTTP Request Smuggling vulnerability or weakness.
Products Associated with CVE-2022-25763
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-25763 are published in these products:
Affected Versions
Apache Software Foundation Apache Traffic Server Version 8.0.0 to 9.1.2 is affected by CVE-2022-25763Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.