First published: Thu Nov 11 2021(Updated: )
An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Traffic Control | >=5.1.0<5.1.4 | |
Apache Traffic Control | >=6.0.0<6.0.1 | |
Apache Traffic Control | =5.1.4-rc0 | |
Apache Traffic Control | =6.0.1-rc0 | |
go/github.com/apache/trafficcontrol | >=5.1.0<5.1.4 | 5.1.4 |
go/github.com/apache/trafficcontrol | >=6.0.0<6.0.1 | 6.0.1 |
>=5.1.0<5.1.4 | ||
>=6.0.0<6.0.1 | ||
=5.1.4-rc0 | ||
=6.0.1-rc0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.