Server-Side Request Forgery in Apache Traffic Control
High severity
GitHub Reviewed
Published
Feb 7, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Package
Affected versions
>= 6.0.0, < 6.1.0
< 5.1.6
Patched versions
6.1.0
5.1.6
Description
Published by the National Vulnerability Database
Feb 6, 2022
Published to the GitHub Advisory Database
Feb 7, 2022
Reviewed
Feb 14, 2022
Last updated
Feb 3, 2023
In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.
References