Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAMAKGdCR2E2ZiRT_Z6shTnhy5K7udJJdAgFBz3w-Fxs6AiWnuw@mail.gmail.com>
Date: Mon, 25 Jan 2021 09:55:55 -0700
From: ocket 8888 <ocket8888@...il.com>
To: oss-security@...ts.openwall.com
Subject: CVE-2020-17522: Traffic Control Mid Tier Cache Manipulation Attack

 CVE-2020-17522: Mid Tier Cache Manipulation Attack

Severity: Important

Vendor:
The Apache Software Foundation

Versions Affected:
Traffic Control 3.0.0 to 3.1.0
Traffic Control 4.0.0 to 4.1.0
The unsupported Traffic Control 3.x versions may be also affected

Description:
When ORT (now via atstccfg) generates ip_allow.config
files, those files include permissions that allow bad actors to push
arbitrary content into and remove arbitrary content from CDN cache servers.
Additionally, these permissions are potentially extended to IP addresses
outside the desired range, resulting in them being granted to clients
possibly outside the CDN arcitechture.

Mitigation:
3.x users should upgrade to 4.1.1, 5.0.0, or later versions
4.0.x and 4.1.0 users should upgrade to 4.1.1 or later versions

Credit:
This issue was discovered by Chris Lemmons of Comcast.

References:
https://trafficcontrol.apache.org/security/

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.