"TITLE":"LDAP filter injection vulnerability in Traffic Ops"
},
"affects":{
"vendor":{
"vendor_data":[
{
"product":{
"product_data":[
{
"product_name":"Apache Traffic Control",
"version":{
"version_data":[
{
"version_affected":"<",
"version_name":"Traffic Ops",
"version_value":"6.0.1"
},
{
"version_affected":"<",
"version_name":"Traffic Ops",
"version_value":"5.1.4"
}
]
}
}
]
},
"vendor_name":"Apache Software Foundation"
}
]
}
},
"credit":[
{
"lang":"eng",
"value":"This issue was discovered by Apache Traffic Control user pupiles."
}
],
"data_format":"MITRE",
"data_type":"CVE",
"data_version":"4.0",
"description":{
"description_data":[
{
"lang":"eng",
"value":"An unauthenticated Apache Traffic Control Traffic Ops user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter."
}
]
},
"generator":{
"engine":"Vulnogram 0.0.9"
},
"impact":[
{
"other":"critical"
}
],
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang":"eng",
"value":"CWE-90 Improper Neutralization of Special Elements used in an LDAP Query ('LDAP Injection')"