An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request.

Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vq94-9pfv-ccqr SQL injection in Apache Traffic Control
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.35905}

epss

{'score': 0.33732}


Tue, 11 Feb 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache traffic Control
CPEs cpe:2.3:a:apache:traffic_control:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache traffic Control

Tue, 24 Dec 2024 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Dec 2024 18:30:00 +0000

Type Values Removed Values Added
References

Mon, 23 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
Description An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request. Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
Title Apache Traffic Control: SQL Injection in Traffic Ops endpoint PUT deliveryservice_request_comments
Weaknesses CWE-285
CWE-89
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-12-24T01:47:40.228Z

Reserved: 2024-08-28T18:16:31.298Z

Link: CVE-2024-45387

cve-icon Vulnrichment

Updated: 2024-12-23T18:03:27.183Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-23T16:15:06.590

Modified: 2025-02-11T16:07:15.220

Link: CVE-2024-45387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.