{"uuid": "f4b56d37-dd6c-42d5-894d-406e1fe37724", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-45387", "type": "published-proof-of-concept", "source": "https://t.me/thehackernews/6088", "content": "\u26a0\ufe0f Apache Traffic Control users\u2014an SQL injection flaw (CVE-2024-45387) has been found, enabling attackers to execute commands directly in your database. \n \nThis flaw is easily exploitable by sending a specially crafted PUT request. \n \n\ud83d\udd27 How to act now: \n\u00bb Update to version 8.0.2 ASAP. \n\u00bb Audit access permissions for high-risk roles. \n\u00bb Double-check database configurations for security loopholes. \n \nRead: https://thehackernews.com/2024/12/critical-sql-injection-vulnerability-in.html", "creation_timestamp": "2024-12-25T14:34:03.000000Z"}