
Cloud Vulnerability DB
A community-led vulnerabilities database
In Apache Traffic Control Traffic Ops prior to versions 6.1.0 or 5.1.6, a Server-Side Request Forgery (SSRF) vulnerability was identified. The vulnerability was discovered and assigned CVE-2022-23206, with the record being created on January 13, 2022, and publicly disclosed in February 2022 (CVE Details).
The vulnerability exists in the /user/login/oauth endpoint of Traffic Ops. An unprivileged user with HTTPS access to Traffic Ops can send a specially-crafted POST request to the /user/login/oauth endpoint, which allows them to scan ports on servers that Traffic Ops can reach (NVD Report).
This vulnerability could allow attackers to perform unauthorized port scanning of internal systems that are accessible to the Traffic Ops server, potentially leading to network reconnaissance and discovery of additional attack vectors (Apache Advisory).
Users are advised to upgrade Apache Traffic Control Traffic Ops to version 6.1.0 or 5.1.6 or later versions to address this vulnerability (CVE Details).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."