In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1233 | In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach. |
Github GHSA |
GHSA-wp47-9r3h-xfgq | Server-Side Request Forgery in Apache Traffic Control |
Fixes
Solution
No solution given by the vendor.
Workaround
6.0.x user should upgrade to 6.1.0. 5.1.x users should upgrade to 5.1.6 or 6.1.0.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T03:36:20.177Z
Reserved: 2022-01-13T00:00:00
Link: CVE-2022-23206
No data.
Status : Modified
Published: 2022-02-06T16:15:07.593
Modified: 2024-11-21T06:48:12.553
Link: CVE-2022-23206
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA