An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request. Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
History

Tue, 24 Dec 2024 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 23 Dec 2024 18:30:00 +0000

Type Values Removed Values Added
References

Mon, 23 Dec 2024 15:45:00 +0000

Type Values Removed Values Added
Description An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request. Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
Title Apache Traffic Control: SQL Injection in Traffic Ops endpoint PUT deliveryservice_request_comments
Weaknesses CWE-285
CWE-89
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2024-12-23T15:30:13.873Z

Updated: 2024-12-24T01:47:40.228Z

Reserved: 2024-08-28T18:16:31.298Z

Link: CVE-2024-45387

cve-icon Vulnrichment

Updated: 2024-12-23T18:03:27.183Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-12-23T16:15:06.590

Modified: 2024-12-23T18:15:07.043

Link: CVE-2024-45387

cve-icon Redhat

No data.