Vulnerability Details : CVE-2017-5660
There is a vulnerability in Apache Traffic Server (ATS) 6.2.0 and prior and 7.0.0 and prior with the Host header and line folding. This can have issues when interacting with upstream proxies and the wrong host being used.
Vulnerability category: Input validation
Threat overview for CVE-2017-5660
Top countries where our scanners detected CVE-2017-5660
Top open port discovered on systems with this issue
80
IPs affected by CVE-2017-5660 129
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2017-5660!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2017-5660
Probability of exploitation activity in the next 30 days: 0.22%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 60 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2017-5660
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
8.6
|
HIGH | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N |
3.9
|
4.0
|
NIST |
CWE ids for CVE-2017-5660
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2017-5660
-
https://www.debian.org/security/2018/dsa-4128
Debian -- Security Information -- DSA-4128-1 trafficserverThird Party Advisory
-
https://lists.apache.org/thread.html/22d84783d94c53a5132ec89f002fe5165c87561a9428bcb6713b3c98@%3Cdev.trafficserver.apache.org%3E
[ANNOUNCE] Apache Traffic Server host header and line folding - CVE-2017-5660 - Pony MailVendor Advisory
Products affected by CVE-2017-5660
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:6.2.2:rc0:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:7.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:7.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:6.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:6.2.1:rc0:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:6.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:apache:traffic_server:7.0.0:rc0:*:*:*:*:*:*