Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
No analysis available yet.
No remediation available yet.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-vq94-9pfv-ccqr | SQL injection in Apache Traffic Control |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Tue, 11 Feb 2025 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache traffic Control |
|
| CPEs | cpe:2.3:a:apache:traffic_control:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache
Apache traffic Control |
Tue, 24 Dec 2024 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Dec 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 23 Dec 2024 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request. Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops. | |
| Title | Apache Traffic Control: SQL Injection in Traffic Ops endpoint PUT deliveryservice_request_comments | |
| Weaknesses | CWE-285 CWE-89 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-12-24T01:47:40.228Z
Reserved: 2024-08-28T18:16:31.298Z
Link: CVE-2024-45387
Updated: 2024-12-23T18:03:27.183Z
Status : Analyzed
Published: 2024-12-23T16:15:06.590
Modified: 2025-02-11T16:07:15.220
Link: CVE-2024-45387
No data.
OpenCVE Enrichment
No data.
Github GHSA