An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request.

Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vq94-9pfv-ccqr SQL injection in Apache Traffic Control
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 16 Jul 2025 22:45:00 +0900

Type Values Removed Values Added
Metrics epss

{'score': 0.35905}

epss

{'score': 0.33732}


Wed, 12 Feb 2025 01:30:00 +0900

Type Values Removed Values Added
First Time appeared Apache
Apache traffic Control
CPEs cpe:2.3:a:apache:traffic_control:*:*:*:*:*:*:*:*
Vendors & Products Apache
Apache traffic Control

Tue, 24 Dec 2024 11:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 24 Dec 2024 03:30:00 +0900

Type Values Removed Values Added
References

Tue, 24 Dec 2024 00:45:00 +0900

Type Values Removed Values Added
Description An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role "admin", "federation", "operations", "portal", or "steering" to execute arbitrary SQL against the database by sending a specially-crafted PUT request. Users are recommended to upgrade to version Apache Traffic Control 8.0.2 if you run an affected version of Traffic Ops.
Title Apache Traffic Control: SQL Injection in Traffic Ops endpoint PUT deliveryservice_request_comments
Weaknesses CWE-285
CWE-89
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-12-24T01:47:40.228Z

Reserved: 2024-08-28T18:16:31.298Z

Link: CVE-2024-45387

cve-icon Vulnrichment

Updated: 2024-12-23T18:03:27.183Z

cve-icon NVD

Status : Analyzed

Published: 2024-12-23T16:15:06.590

Modified: 2025-02-11T16:07:15.220

Link: CVE-2024-45387

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses