CVE-2021-42009

Severity
4.3MEDIUM
EPSS
0.7%
top 28.93%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 12
Latest updateAug 21

Description

An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages3 packages

NVDapache/traffic_control4.1.05.1.3
Gogithub.com/apache/trafficcontrol< 5.1.3+incompatible+1
CVEListV5apache_software_foundation/apache_traffic_control4.0.0Apache Traffic Control*

Patches

🔴Vulnerability Details

4
OSV
Email relay in Apache Traffic Control in github.com/apache/trafficcontrol2024-08-21
GHSA
Email relay in Apache Traffic Control2021-10-13
OSV
Email relay in Apache Traffic Control2021-10-13
CVEList
Apache Traffic Control Traffic Ops Email Injection Vulnerability2021-10-12
CVE-2021-42009 (MEDIUM CVSS 4.3) | An authenticated Apache Traffic Con | cvebase.io