Vulnerability Details CVE-2021-32565
Invalid values in the Content-Length header sent to Apache Traffic Server allows an attacker to smuggle requests. This issue affects Apache Traffic Server 7.0.0 to 7.1.12, 8.0.0 to 8.1.1, 9.0.0 to 9.0.1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.077
EPSS Ranking 91.4%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2021-32565
-
cpe:2.3:a:apache:traffic_server:7.0.0
-
cpe:2.3:a:apache:traffic_server:7.1.0
-
cpe:2.3:a:apache:traffic_server:7.1.1
-
cpe:2.3:a:apache:traffic_server:7.1.10
-
cpe:2.3:a:apache:traffic_server:7.1.11
-
cpe:2.3:a:apache:traffic_server:7.1.12
-
cpe:2.3:a:apache:traffic_server:7.1.2
-
cpe:2.3:a:apache:traffic_server:7.1.3
-
cpe:2.3:a:apache:traffic_server:7.1.4
-
cpe:2.3:a:apache:traffic_server:7.1.5
-
cpe:2.3:a:apache:traffic_server:7.1.6
-
cpe:2.3:a:apache:traffic_server:7.1.7
-
cpe:2.3:a:apache:traffic_server:7.1.8
-
cpe:2.3:a:apache:traffic_server:7.1.9
-
cpe:2.3:a:apache:traffic_server:8.0.0
-
cpe:2.3:a:apache:traffic_server:8.0.1
-
cpe:2.3:a:apache:traffic_server:8.0.2
-
cpe:2.3:a:apache:traffic_server:8.0.3
-
cpe:2.3:a:apache:traffic_server:8.0.4
-
cpe:2.3:a:apache:traffic_server:8.0.5
-
cpe:2.3:a:apache:traffic_server:8.0.6
-
cpe:2.3:a:apache:traffic_server:8.0.7
-
cpe:2.3:a:apache:traffic_server:8.0.8
-
cpe:2.3:a:apache:traffic_server:8.1.0
-
cpe:2.3:a:apache:traffic_server:8.1.1
-
cpe:2.3:a:apache:traffic_server:9.0.0
-
cpe:2.3:a:apache:traffic_server:9.0.1
-
cpe:2.3:o:debian:debian_linux:10.0