In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-1233 | In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach. |
Github GHSA |
GHSA-wp47-9r3h-xfgq | Server-Side Request Forgery in Apache Traffic Control |
Fixes
Solution
No solution given by the vendor.
Workaround
6.0.x user should upgrade to 6.1.0. 5.1.x users should upgrade to 5.1.6 or 6.1.0.
References
History
No history.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T03:36:20.177Z
Reserved: 2022-01-13T00:00:00
Link: CVE-2022-23206
No data.
Status : Modified
Published: 2022-02-06T16:15:07.593
Modified: 2024-11-21T06:48:12.553
Link: CVE-2022-23206
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA