{"id":"CVE-2022-23206","details":"In Apache Traffic Control Traffic Ops prior to 6.1.0 or 5.1.6, an unprivileged user who can reach Traffic Ops over HTTPS can send a specially-crafted POST request to /user/login/oauth to scan a port of a server that Traffic Ops can reach.","aliases":["GHSA-wp47-9r3h-xfgq","GO-2022-0585"],"modified":"2026-04-10T04:44:41.014406Z","published":"2022-02-06T16:15:07.593Z","references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/lsrd2mqj29vrvwsh8g0d560vvz8n126f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/incubator-trafficcontrol","events":[{"introduced":"0"},{"fixed":"4fa2f35231831b406b6d9fcdaa6690b6da368aac"},{"introduced":"22a98e7e862ab518598d141d7680170d5100f52d"},{"fixed":"bc8bde52524600d27d424c1c683458fcd8305339"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"5.1.6"},{"introduced":"6.0.0"},{"fixed":"6.1.0"}]}}],"versions":["1.1.0-release","1.1.1-hotfix","1.1.1-release","1.1.2-release","RELEASE-1.4.0-RC0","RELEASE-1.5.0-RC0","RELEASE-1.6.0-RC0","RELEASE-1.7.0-RC0","RELEASE-2.2.0-RC0","RELEASE-4.0.0-RC0","RELEASE-5.0.0-RC0","RELEASE-5.1.0","RELEASE-5.1.0-RC0","RELEASE-5.1.1","RELEASE-5.1.2","RELEASE-5.1.2-RC0","RELEASE-5.1.2-RC1","RELEASE-5.1.2-RC2","RELEASE-5.1.2-RC3","RELEASE-5.1.3","RELEASE-5.1.3-RC0","RELEASE-5.1.4","RELEASE-5.1.4-RC0","RELEASE-5.1.5","RELEASE-5.1.5-RC0","RELEASE-6.1.0","RELEASE-6.1.0-RC0","RELEASE-6.1.0-RC1","RELEASE-6.1.0-RC2","traffic_monitor-1.1.1","traffic_ops-release-1.1.2","traffic_ops-release-1.1.3","traffic_ops-release-1.1.5","traffic_ops-release-1.1.6","traffic_router-1.1.1","traffic_router-1.1.2","v1.1.3","v5.1.0","v5.1.1","v5.1.2","v5.1.3","v5.1.4"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23206.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}