{ "id": "CVE-2023-30631", "sourceIdentifier": "security@apache.org", "published": "2023-06-14T08:15:09.257", "lastModified": "2023-06-14T08:15:09.257", "vulnStatus": "Received", "descriptions": [ { "lang": "en", "value": "Improper Input Validation vulnerability in Apache Software Foundation Apache Traffic Server.\u00a0 The configuration option\u00a0proxy.config.http.push_method_enabled didn't function.\u00a0 However, by default the PUSH method is blocked in the ip_allow configuration file.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.\n\n8.x users should upgrade to 8.1.7 or later versions\n9.x users should upgrade to 9.2.1 or later versions\n\n\n" } ], "metrics": {}, "weaknesses": [ { "source": "security@apache.org", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-20" } ] } ], "references": [ { "url": "https://lists.apache.org/thread/tns2b4khyyncgs5v5p9y35pobg9z2bvs", "source": "security@apache.org" } ] }