Description
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
Published: 2021-10-12
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Workaround

5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-2206 An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
Github GHSA Github GHSA GHSA-gw97-f6h8-gm94 Email relay in Apache Traffic Control
History

No history.

Subscriptions

Apache Traffic Control
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-04T03:22:25.843Z

Reserved: 2021-10-05T00:00:00.000Z

Link: CVE-2021-42009

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-10-12T08:15:06.920

Modified: 2024-11-21T06:27:03.750

Link: CVE-2021-42009

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses