Press ESC to close

Critical SQL Injection Vulnerability in Apache Traffic Control Rated 9.9 CVSS — Patch Now

Category Details
Threat Actors • No specific threat actors identified, but the vulnerability could be exploited by attackers with privileged access.
Campaign Overview • Exploitation of SQL injection vulnerability in Apache Traffic Control, allowing attackers to execute arbitrary SQL commands in the database.
Target Regions (Victims) • Global, targeting organizations using Apache Traffic Control.
Methodology • SQL injection attack via specially-crafted PUT requests from privileged users (admin, federation, operations, etc.).
Product Targeted • Apache Traffic Control (versions <= 8.0.1, >= 8.0.0).
Malware Reference • No malware referenced, but potential for unauthorized database manipulation.
Tools Used • SQL injection techniques.
Vulnerabilities Exploited • SQL injection vulnerability in Traffic Ops in Apache Traffic Control.
TTPs • Privileged users executing unauthorized SQL commands through PUT requests.
Attribution • Vulnerability discovered by Tencent YunDing Security Lab researcher Yuan Luo.
Recommendations • Update Apache Traffic Control to version 8.0.2 or later to mitigate the vulnerability.
Source The Hackers News

Read full article: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html

The above summary has been generated by an AI language model

Stay Updated with Our Newsletter

Source: TheHackersNews

Published on: December 25, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *