CVE-2022-23206Server-Side Request Forgery in Software Foundation Apache Traffic Control

Severity
7.5HIGHNVD
EPSS
0.8%
top 25.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 6
Latest updateAug 21

Description

In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

NVDapache/traffic_control6.0.06.1.0+1
Gogithub.com/apache_trafficcontrol6.0.0+incompatible6.1.0+incompatible+3
CVEListV5apache_software_foundation/apache_traffic_controlTraffic Ops6.1.0

🔴Vulnerability Details

4
OSV
Server-Side Request Forgery in Apache Traffic Control in github.com/apache/trafficcontrol2024-08-21
GHSA
Server-Side Request Forgery in Apache Traffic Control2022-02-07
OSV
Server-Side Request Forgery in Apache Traffic Control2022-02-07
CVEList
Server-Side Request Forgery in Traffic Ops endpoint POST /user/login/oauth2022-02-06
CVE-2022-23206 — Server-Side Request Forgery | cvebase