thehackernews.com
Open in
urlscan Pro
2606:4700:20::681a:a75
Public Scan
Submitted URL: https://click.email.sans.org/?qs=1418d39e0b0f368d72016ba1a5fc7f2287c8b3654cff9e7aac9e6066b13ee0103cf2e3431fbee9a057ee277001f1...
Effective URL: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html?is=cee05d55bf932969ae2e52388846c3ab9dc2f4ee...
Submission: On January 04 via api from AE — Scanned from AU
Effective URL: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html?is=cee05d55bf932969ae2e52388846c3ab9dc2f4ee...
Submission: On January 04 via api from AE — Scanned from AU
Form analysis
2 forms found in the DOMGET https://www.google.com/cse
<form action="https://www.google.com/cse" id="searchform" method="get"><input autocomplete="off" id="s" name="q" placeholder="Search Here..." type="text">
<input name="cx" type="hidden" value="partner-pub-7983783048239650:3179771210">
</form>
Name: f1 — POST https://inl02.netline.com/rssnews0001/
<form action="https://inl02.netline.com/rssnews0001/" class="clear cf" id="subform" method="post" name="f1" target="_blank">
<div class="email-box-h3">Get Latest News in Your Inbox</div>
<p>Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free.</p>
<div class="email-input">
<input name="_submit" type="hidden" value="0001">
<input id="brand" name="brand" type="hidden" value="thehackernews">
<div class="e-book"><input checked="yes" id="opt_001" name="opt_001" type="checkbox" value="Y"><input checked="yes" id="opt_003" name="opt_003" type="checkbox" value="Y"></div><label class="visuallyhidden" for="input-email">Email</label><input
class="text" id="input-email" name="email" placeholder="Your e-mail address" required="" type="email">
<button aria-label="Subscribe" id="submitform" type="submit" value="Subscribe"></button>
</div>
</form>
Text Content
Bits, Bytes, and Breaking News Followed by 5.20+ million Subscribe – Get Latest News * Home * Newsletter * Webinars * Home * Data Breaches * Cyber Attacks * Vulnerabilities * Webinars * Expert Insights * Contact Resources * Webinars * THN Store * Free eBooks About Site * About THN * Jobs * Advertise with us Contact/Tip Us Reach out to get featured—contact us to send your exclusive story idea, research, hacks, or ask us a question or leave a comment/feedback! Follow Us On Social Media RSS Feeds Email Alerts Telegram Channel CRITICAL SQL INJECTION VULNERABILITY IN APACHE TRAFFIC CONTROL RATED 9.9 CVSS — PATCH NOW Dec 25, 2024Ravie LakshmananServer Security / Vulnerability The Apache Software Foundation (ASF) has shipped security updates to address a critical security flaw in Traffic Control that, if successfully exploited, could allow an attacker to execute arbitrary Structured Query Language (SQL) commands in the database. The SQL injection vulnerability, tracked as CVE-2024-45387, is rated 9.9 out of 10.0 on the CVSS scoring system. "An SQL injection vulnerability in Traffic Ops in Apache Traffic Control <= 8.0.1, >= 8.0.0 allows a privileged user with role 'admin,' 'federation,' 'operations,' 'portal,' or 'steering' to execute arbitrary SQL against the database by sending a specially-crafted PUT request," project maintainers said in an advisory. Apache Traffic Control is an open-source implementation of a Content Delivery Network (CDN). It was announced as a top-level project (TLP) by the AS in June 2018. Tencent YunDing Security Lab researcher Yuan Luo has been credited with discovering and reporting the vulnerability. It has been patched in version Apache Traffic Control 8.0.2. The development comes as the ASF has resolved an authentication bypass flaw in Apache HugeGraph-Server (CVE-2024-43441) from versions 1.0 through 1.3. A fix for the shortcoming has been released in version 1.5.0. It also follows the release of a patch for an important vulnerability in Apache Tomcat (CVE-2024-56337) that could result in remote code execution (RCE) under certain conditions. Users are recommended to update their instances to the latest versions of the software to protect against potential threats. Found this article interesting? Follow us on Twitter and LinkedIn to read more exclusive content we post. SHARE Tweet Share Share Share Share on Facebook Share on Twitter Share on Linkedin Share on Reddit Share on Hacker News Share on Email Share on WhatsApp Share on Facebook Messenger Share on Telegram SHARE ApacheContent Delivery Networkremote code executionSecurity Updatessql injectionTomcatVulnerability Trending News ⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips Top 10 Cybersecurity Trends to Expect in 2025 Dozens of Chrome Extensions Hacked, Exposing Millions of Users to Data Theft New "DoubleClickjacking" Exploit Bypasses Clickjacking Protections on Major Websites Chinese APT Exploits BeyondTrust API Key to Access U.S. Treasury Systems and Documents When Good Extensions Go Bad: Takeaways from the Campaign Targeting Browser Extensions 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials LDAPNightmare PoC Exploit Crashes LSASS and Reboots Windows Domain Controllers Apple to Pay Siri Users $20 Per Device in Settlement Over Accidental Siri Privacy Violations New U.S. DoJ Rule Halts Bulk Data Transfers to Adversarial Nations to Protect Privacy Misconfigured Kubernetes RBAC in Azure Airflow Could Expose Entire Cluster to Exploitation Show More Popular Resources Backupify — The Backup Solution: Encrypted, Unlimited, Reliable Secure Your SaaS Stack and Cut Costs by 25%—Start Your Auvik Trial Now Intel — Free Tool Every Infosec Pro Needs to Track Trending CVEs Get Step-by-Step Guide to Kickstarting a Browser Security Program CYBERSECURITY WEBINARS Cyber Defense Playbook THE TOOLS YOU NEED TO COMBAT RANSOMWARE IN 2025 Discover proactive strategies to identify vulnerabilities, block encrypted threats, and prevent ransomware from infiltrating your network. Join the Webinar Securing Digital Ecosystems THE ENTERPRISE GUIDE TO CERTIFICATE AUTOMATION AND BEYOND Join us to explore DigiCert ONE's advanced tools for automating compliance and securing DevOps processes. Sign Up Now Breaking News Cybersecurity Resources Discover How to Make CTEM a Reality in 2025: Download Your Guide Now! Ensure CTEM success with our latest ebook! Gain practical insights and tips on how to leverage the XM Cyber platform to make your exposure management strategy a reality. Download now! Gain Critical Cybersecurity Skills at SANS Security East Baltimore 2025 Fast, focused, and expert-led courses to boost your career. Join SANS to level up! Stop Playing the Hackers' Game Their Way Organizations are still spending billions of dollars on Firewalls and VPNs—yet breaches continue to rise. 56% of organizations were attacked because of VPN vulnerabilities in 2024. It's time for modern security infrastructure with Zscaler Zero Trust and AI. Advance in the Field of Cybersecurity with Georgetown Our Certificate in Cybersecurity Risk Management will give you the skills you need to lead. Expert Insights / Articles Videos SECURING OPEN SOURCE: LESSONS FROM THE SOFTWARE SUPPLY CHAIN REVOLUTION December 2, 2024 Read ➝ 5 STRATEGIES TO COMBAT RANSOMWARE AND ENSURE DATA SECURITY IN MICROSOFT 365 December 2, 2024 Read ➝ DEFENSIBLE SECURITY ARCHITECTURE AND ENGINEERING: DESIGNING AND BUILDING DEFENSES FOR THE FUTURE November 25, 2024 Read ➝ BREATHING NEW LIFE INTO A STAGNANT APPSEC November 14, 2024 Read ➝ Get Latest News in Your Inbox Get the latest news, expert insights, exclusive resources, and strategies from industry leaders – all for free. Email Connect with us! 925,500 Followers 615,100 Followers 23,100 Subscribers 145,000 Followers 1,890,500 Followers 140,100 Subscribers Company * About THN * Advertise with us * Contact Pages * Webinars * Deals Store * Privacy Policy Deals * Hacking * Development * Android RSS Feeds Contact Us © The Hacker News, 2024. All Rights Reserved.