In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
Advisories
Source ID Title
EUVD EUVD EUVD-2022-1233 In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
Github GHSA Github GHSA GHSA-wp47-9r3h-xfgq Server-Side Request Forgery in Apache Traffic Control
Fixes

Solution

No solution given by the vendor.


Workaround

6.0.x user should upgrade to 6.1.0. 5.1.x users should upgrade to 5.1.6 or 6.1.0.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-08-03T03:36:20.177Z

Reserved: 2022-01-13T00:00:00

Link: CVE-2022-23206

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-02-06T16:15:07.593

Modified: 2024-11-21T06:48:12.553

Link: CVE-2022-23206

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.