Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now


The Apache Software program Basis (ASF) has shipped safety updates to deal with a essential safety flaw in Site visitors Management that, if efficiently exploited, may permit an attacker to execute arbitrary Structured Question Language (SQL) instructions within the database.

The SQL injection vulnerability, tracked as CVE-2024-45387, is rated 9.9 out of 10.0 on the CVSS scoring system.

“An SQL injection vulnerability in Site visitors Ops in Apache Site visitors Management <= 8.0.1, >= 8.0.0 permits a privileged person with function ‘admin,’ ‘federation,’ ‘operations,’ ‘portal,’ or ‘steering’ to execute arbitrary SQL in opposition to the database by sending a specially-crafted PUT request,” venture maintainers said in an advisory.

Apache Traffic Control is an open-source implementation of a Content material Supply Community (CDN). It was announced as a top-level venture (TLP) by the AS in June 2018.

Cybersecurity

Tencent YunDing Safety Lab researcher Yuan Luo has been credited with discovering and reporting the vulnerability. It has been patched in model Apache Site visitors Management 8.0.2.

The event comes because the ASF has resolved an authentication bypass flaw in Apache HugeGraph-Server (CVE-2024-43441) from variations 1.0 by way of 1.3. A repair for the shortcoming has been launched in model 1.5.0.

It additionally follows the discharge of a patch for an necessary vulnerability in Apache Tomcat (CVE-2024-56337) that would end in distant code execution (RCE) beneath sure circumstances.

Customers are advisable to replace their situations to the newest variations of the software program to guard in opposition to potential threats.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.





Source link

Leave a Reply

Your email address will not be published. Required fields are marked *