An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request.
Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
Metrics
Affected Vendors & Products
References
History
Tue, 24 Dec 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 23 Dec 2024 18:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 23 Dec 2024 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request. Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops. | |
Title | Apache Traffic Control: SQL Injection in Traffic Ops endpoint PUT deliveryservice_request_comments | |
Weaknesses | CWE-285 CWE-89 |
|
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: apache
Published: 2024-12-23T15:30:13.873Z
Updated: 2024-12-24T01:47:40.228Z
Reserved: 2024-08-28T18:16:31.298Z
Link: CVE-2024-45387
Vulnrichment
Updated: 2024-12-23T18:03:27.183Z
NVD
Status : Awaiting Analysis
Published: 2024-12-23T16:15:06.590
Modified: 2024-12-23T18:15:07.043
Link: CVE-2024-45387
Redhat
No data.