CVE-2022-23206

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23206
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23206.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23206
Aliases
Published
2022-02-06T16:15:07Z
Modified
2024-06-06T13:56:16.565507Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.

References

Affected packages

Git / github.com/apache/incubator-trafficcontrol

Affected ranges

Type
GIT
Repo
https://github.com/apache/incubator-trafficcontrol
Events
Type
GIT
Repo
https://github.com/apache/trafficcontrol
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.1.0-release
1.1.1-hotfix
1.1.1-release
1.1.2-release

RELEASE-1.*

RELEASE-1.4.0-RC0
RELEASE-1.5.0-RC0
RELEASE-1.6.0-RC0
RELEASE-1.7.0-RC0

RELEASE-2.*

RELEASE-2.2.0-RC0

RELEASE-4.*

RELEASE-4.0.0-RC0

RELEASE-5.*

RELEASE-5.0.0-RC0
RELEASE-5.1.0
RELEASE-5.1.0-RC0
RELEASE-5.1.1
RELEASE-5.1.2
RELEASE-5.1.2-RC0
RELEASE-5.1.2-RC1
RELEASE-5.1.2-RC2
RELEASE-5.1.2-RC3
RELEASE-5.1.3
RELEASE-5.1.3-RC0
RELEASE-5.1.4
RELEASE-5.1.4-RC0
RELEASE-5.1.5
RELEASE-5.1.5-RC0

traffic_monitor-1.*

traffic_monitor-1.1.1

traffic_ops-release-1.*

traffic_ops-release-1.1.2
traffic_ops-release-1.1.3
traffic_ops-release-1.1.5
traffic_ops-release-1.1.6

traffic_router-1.*

traffic_router-1.1.1
traffic_router-1.1.2

v1.*

v1.1.3

v5.*

v5.1.0
v5.1.1
v5.1.2
v5.1.3
v5.1.4