First published: Tue Jan 26 2021(Updated: )
When ORT (now via atstccfg) generates ip_allow.config files in Apache Traffic Control 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resulting in them being granted to clients possibly outside the CDN arcitechture.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Control | >=3.0.0<=3.1.0 | |
Apache Traffic Control | >=4.0.0<=4.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-17522 has been classified as a moderate severity vulnerability due to its potential impact on CDN cache security.
To mitigate CVE-2020-17522, it's recommended to update Apache Traffic Control to a version beyond 4.1.0 to close the vulnerability.
CVE-2020-17522 affects Apache Traffic Control versions 3.0.0 to 3.1.0 and 4.0.0 to 4.1.0.
CVE-2020-17522 allows attackers to push arbitrary content into and remove arbitrary content from CDN cache servers.
CVE-2020-17522 only applies to Apache Traffic Control versions starting from 3.0.0 onwards, thus earlier versions are not affected.