An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
References
Configurations
History
19 Oct 2021, 01:18
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:apache:traffic_control:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : 4.0
v3 : 4.3 |
CWE | CWE-20 | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2021/10/12/1 - Mailing List, Third Party Advisory | |
References | (MISC) https://lists.apache.org/thread.html/rf0481b9e38ece1ece458d3ce7b2d671df819e3555597f31fc34f084e%40%3Ccommits.trafficcontrol.apache.org%3E - Mailing List, Patch, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r78d471d8a4fd268a4c5ae6c47327c09d9d4b4467c31da2c97422febb@%3Cdev.trafficcontrol.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MLIST) https://lists.apache.org/thread.html/r7dfa9a89b39d06caeeeb7b5cdc41b3493a9b86cc6cfa059d3f349d87@%3Cannounce.apache.org%3E - Mailing List, Vendor Advisory | |
References | (MISC) https://lists.apache.org/thread.html/re384fd0f44c6d230f31376153c6e8b59e4a669f927c1533d06d702af%40%3Cdev.trafficcontrol.apache.org%3E - Mailing List, Vendor Advisory |
14 Oct 2021, 00:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
13 Oct 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Oct 2021, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Oct 2021, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-10-12 08:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-42009
Mitre link : CVE-2021-42009
CVE.ORG link : CVE-2021-42009
JSON object : View
Products Affected
apache
- traffic_control
CWE
CWE-20
Improper Input Validation