Description
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
No analysis available yet.
Remediation
Vendor Workaround
5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2206 | An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3. |
Github GHSA |
GHSA-gw97-f6h8-gm94 | Email relay in Apache Traffic Control |
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-04T03:22:25.843Z
Reserved: 2021-10-05T00:00:00.000Z
Link: CVE-2021-42009
No data.
Status : Modified
Published: 2021-10-12T08:15:06.920
Modified: 2024-11-21T06:27:03.750
Link: CVE-2021-42009
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA