|
Message-ID: <CAMAKGdCR2E2ZiRT_Z6shTnhy5K7udJJdAgFBz3w-Fxs6AiWnuw@mail.gmail.com> Date: Mon, 25 Jan 2021 09:55:55 -0700 From: ocket 8888 <ocket8888@...il.com> To: oss-security@...ts.openwall.com Subject: CVE-2020-17522: Traffic Control Mid Tier Cache Manipulation Attack CVE-2020-17522: Mid Tier Cache Manipulation Attack Severity: Important Vendor: The Apache Software Foundation Versions Affected: Traffic Control 3.0.0 to 3.1.0 Traffic Control 4.0.0 to 4.1.0 The unsupported Traffic Control 3.x versions may be also affected Description: When ORT (now via atstccfg) generates ip_allow.config files, those files include permissions that allow bad actors to push arbitrary content into and remove arbitrary content from CDN cache servers. Additionally, these permissions are potentially extended to IP addresses outside the desired range, resulting in them being granted to clients possibly outside the CDN arcitechture. Mitigation: 3.x users should upgrade to 4.1.1, 5.0.0, or later versions 4.0.x and 4.1.0 users should upgrade to 4.1.1 or later versions Credit: This issue was discovered by Chris Lemmons of Comcast. References: https://trafficcontrol.apache.org/security/
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.