First published: Tue Oct 12 2021(Updated: )
An authenticated Apache Traffic Control Traffic Ops user with Portal-level privileges can send a request with a specially-crafted email subject to the /deliveryservices/request Traffic Ops endpoint to send an email, from the Traffic Ops server, with an arbitrary body to an arbitrary email address. Apache Traffic Control 5.1.x users should upgrade to 5.1.3 or 6.0.0. 4.1.x users should upgrade to 5.1.3.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Control | >=4.1.0<5.1.3 | |
>=4.1.0<5.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-42009 is classified as a medium-severity vulnerability due to its potential for unauthorized access to email functionalities.
To remediate CVE-2021-42009, users should update Apache Traffic Control to version 5.1.3 or later.
Users of Apache Traffic Control with Portal-level privileges are affected by CVE-2021-42009.
CVE-2021-42009 allows an attacker to send crafted emails through the Traffic Ops endpoint.
CVE-2021-42009 affects Apache Traffic Control versions from 4.1.0 to 5.1.3.