Authentication Bypass Affecting github.com/apache/trafficcontrol/traffic_ops/traffic_ops_golang/auth Open this link in a new tab package, versions <6.0.1
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-GOLANG-GITHUBCOMAPACHETRAFFICCONTROLTRAFFICOPSTRAFFICOPSGOLANGAUTH-1915655
-
published
11 Nov 2021
-
disclosed
11 Nov 2021
-
credit
Unknown
Introduced: 11 Nov 2021
CVE-2021-43350 Open this link in a new tabHow to fix?
Upgrade github.com/apache/trafficcontrol/traffic_ops/traffic_ops_golang/auth
to version 6.0.1 or higher.
Overview
Affected versions of this package are vulnerable to Authentication Bypass. An unauthenticated user can send a request with a specially-crafted username to the POST /login endpoint of any API version to inject unsanitized content into the LDAP filter.