CVE-2023-33933

Source
https://cve.org/CVERecord?id=CVE-2023-33933
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-33933.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-33933
Downstream
Published
2023-06-14T07:44:12.626Z
Modified
2026-05-18T05:55:28.736071115Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
Apache Traffic Server: s3_auth plugin problem with hash calculation
Details

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Software Foundation Apache Traffic Server.This issue affects Apache Traffic Server: from 8.0.0 through 9.2.0.

8.x users should upgrade to 8.1.7 or later versions 9.x users should upgrade to 9.2.1 or later versions

Database specific
{
    "cwe_ids": [
        "CWE-200"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/33xxx/CVE-2023-33933.json",
    "cna_assigner": "apache",
    "unresolved_ranges": [
        {
            "extracted_events": [
                {
                    "introduced": "8.0.0"
                },
                {
                    "last_affected": "9.2.0"
                }
            ],
            "source": "AFFECTED_FIELD"
        },
        {
            "extracted_events": [
                {
                    "introduced": "8.0.0"
                },
                {
                    "fixed": "9.2.0"
                }
            ],
            "source": "DESCRIPTION"
        }
    ]
}
References

Affected packages

Git / github.com/apache/trafficserver

Affected ranges

Type
GIT
Repo
https://github.com/apache/trafficserver
Events
Database specific
{
    "extracted_events": [
        {
            "introduced": "8.0.0"
        },
        {
            "fixed": "8.1.7"
        },
        {
            "introduced": "9.0.0"
        },
        {
            "fixed": "9.2.1"
        }
    ],
    "source": "CPE_FIELD",
    "cpe": "cpe:2.3:a:apache:traffic_server:*:*:*:*:*:*:*:*"
}

Affected versions

8.*
8.0.0
8.0.0-rc4
8.0.1
8.0.1-rc0
8.0.2
8.0.2-rc0
8.0.3
8.0.3-rc0
8.0.4
8.0.4-rc0
8.0.5
8.0.6
8.0.6-rc0
8.0.6-rc1
8.1.0
8.1.0-rc0
8.1.1
8.1.1-rc0
8.1.2-rc0
8.1.3
8.1.3-rc0
8.1.3-rc1
8.1.4
8.1.4-rc0
8.1.5
8.1.5-rc0
8.1.6
8.1.6-rc0

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-33933.json"