Github.Com Apache Trafficcontrol vulnerabilities
6 known vulnerabilities affecting github.com/apache_trafficcontrol.
Total CVEs
6
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
CRITICAL2HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2021-43350CRITICAL≥ 6.0.0, < 6.0.1≥ 5.1.0, < 5.1.42022-05-24
CVE-2021-43350 [CRITICAL] CWE-74 Apache Traffic Control Traffic Ops Vulnerable to LDAP Injection
Apache Traffic Control Traffic Ops Vulnerable to LDAP Injection
An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST `/login` endpoint of any API version to inject unsanitized content into the LDAP filter.
ghsaosv
CVE-2017-7670HIGH≥ 1.1.4, < 1.8.1≥ 2.0.0-RC0, < 2.0.0+3 more2022-05-13
CVE-2017-7670 [HIGH] CWE-400 Apache Traffic Control vulnerable to Slowloris-style Denial of Service attack
Apache Traffic Control vulnerable to Slowloris-style Denial of Service attack
The Traffic Router component of the incubating Apache Traffic Control project is vulnerable to a Slowloris style Denial of Service attack. TCP connections made on the configured DNS port will remain in the `ESTABLISHED` state until the client explicitly closes the connection or Traffic Router is restarted. If con
ghsaosv
CVE-2022-23206HIGH≥ 6.0.0, < 6.1.0≥ 0, < 5.1.62022-02-07
CVE-2022-23206 [HIGH] CWE-918 Server-Side Request Forgery in Apache Traffic Control
Server-Side Request Forgery in Apache Traffic Control
In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
ghsaosv
CVE-2021-42009MEDIUM≥ 0, < 5.1.32021-10-13
CVE-2021-42009 [MEDIUM] CWE-20 Email relay in Apache Traffic Control
Email relay in Apache Traffic Control
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgra
ghsaosv
CVE-2020-17522MEDIUM≥ 0, < 5.0.02021-06-18
CVE-2020-17522 [MEDIUM] CWE-525 Cache Manipulation Attack in Apache Traffic Control
Cache Manipulation Attack in Apache Traffic Control
When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resu
ghsaosv
CVE-2019-12405CRITICAL≥ 3.0.0, < 3.0.2-RC12021-05-18
CVE-2019-12405 [CRITICAL] CWE-287 Improper Authentication in Apache Traffic Control
Improper Authentication in Apache Traffic Control
Improper authentication is possible in Apache Traffic Control versions 3.0.0 and 3.0.1 if LDAP is enabled for login in the Traffic Ops API component. Given a username for a user that can be authenticated via LDAP, it is possible to improperly authenticate as that user without that user's correct password.
ghsaosv