Skip to content

Commit

Permalink
Browse files Browse the repository at this point in the history
  • Loading branch information
advisory-database[bot] committed Dec 23, 2024
1 parent 69c0ddd commit 6813e1d
Showing 1 changed file with 33 additions and 4 deletions.
Original file line number Diff line number Diff line change
@@ -1,24 +1,53 @@
{
"schema_version": "1.4.0",
"id": "GHSA-vq94-9pfv-ccqr",
"modified": "2024-12-23T18:30:47Z",
"modified": "2024-12-23T20:56:26Z",
"published": "2024-12-23T18:30:47Z",
"aliases": [
"CVE-2024-45387"
],
"summary": "SQL injection in Apache Traffic Control",
"details": "An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role \"admin\", \"federation\", \"operations\", \"portal\", or \"steering\" to execute arbitrary SQL against the database by sending a specially-crafted PUT request.\n\nUsers are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.",
"severity": [
{
"type": "CVSS_V3",
"score": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H"
}
],
"affected": [],
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "github.com/apache/trafficcontrol/v8"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"introduced": "8.0.0"
},
{
"fixed": "8.0.2"
}
]
}
]
}
],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-45387"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/trafficcontrol"
},
{
"type": "WEB",
"url": "https://github.com/apache/trafficcontrol/releases/tag/v8.0.2"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/t38nk5n7t8w3pb66z7z4pqfzt4443trr"
Expand All @@ -33,8 +62,8 @@
"CWE-89"
],
"severity": "CRITICAL",
"github_reviewed": false,
"github_reviewed_at": null,
"github_reviewed": true,
"github_reviewed_at": "2024-12-23T20:56:26Z",
"nvd_published_at": "2024-12-23T16:15:06Z"
}
}

0 comments on commit 6813e1d

Please sign in to comment.