Saturday, April 12, 2025
HomeCVE/vulnerabilityApache Traffic Server Flaw Allows Request Smuggling Attacks

Apache Traffic Server Flaw Allows Request Smuggling Attacks

Published on

SIEM as a Service

Follow Us on Google News

A critical vulnerability has been discovered in Apache Traffic Server (ATS), an open-source caching proxy server.

Identified as CVE-2024-53868, this flaw enables attackers to exploit request smuggling via malformed chunked messages.

Users of Apache Traffic Server are urged to upgrade to secure versions of the software immediately to mitigate potential risks.

- Advertisement - Google News

CVE-2024-53868 Details

The vulnerability was reported by Jeppe Bonde Weikop and disclosed on April 3, 2025, by the Apache Software Foundation.

The flaw specifically affects the way ATS processes chunked message bodies. If improperly formatted chunked messages are sent, attackers can leverage the situation to perform HTTP request smuggling attacks.

This type of attack manipulates the processing of web requests to bypass security controls, potentially resulting in data leaks, unauthorized access, or other malicious activities.

According to the advisory, this vulnerability impacts users running certain versions of ATS. The affected versions and their recommended upgrades are detailed below.

Affected Products

ProductAffected VersionsRecommended Upgrade
Apache Traffic Server 9.x9.0.0 to 9.2.9Upgrade to 9.2.10+
Apache Traffic Server 10.x10.0.0 to 10.0.4Upgrade to 10.0.5+

Request smuggling vulnerabilities expose web applications and their backend systems to significant threats. These include:

  • Bypassing Security Measures: Attackers can bypass authentication checks, firewalls, or reverse proxies.
  • Session Hijacking: By injecting malicious requests, attackers can access sessions belonging to legitimate users.
  • Information Disclosure: Sensitive data such as personal identifiers, login credentials, or internal server configuration details could potentially leak.
  • Downtime and System Disruption: Exploiting this flaw could render the application non-operational or cause denial-of-service attacks.

The National Vulnerability Database (NVD) has acknowledged the CVE and is currently working to assign a definitive CVSS score for assessing the severity.

Mitigation and Recommendations

The best course of action for ATS users is to upgrade to the patched versions to address the vulnerability immediately:

  • Users running 9.x versions should upgrade to 9.2.10 or later.
  • Users running 10.x versions should upgrade to 10.0.5 or later.

Additionally, operators are recommended to:

  1. Audit their ATS configurations and logs for unusual activity or exploit attempts.
  2. Regularly monitor updates from the Apache Software Foundation and CVE advisory pages.
  3. Implement robust network monitoring tools to identify potential cases of HTTP request smuggling.

Administrators and security teams are reminded of the importance of timely updates to maintain secure and stable systems.

This disclosure underscores the need for proactive cybersecurity measures in modern infrastructures.

Find this News Interesting! Follow us on Google NewsLinkedIn, & X to Get Instant Updates!

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate...

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as...

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains,...