Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-15180

Опубликовано: 27 мая 2021
Источник: debian
EPSS Низкий

Описание

A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
mariadb-10.5fixed1:10.5.6-1package
mariadb-10.3fixed1:10.3.27-1~exp1experimentalpackage
mariadb-10.3unfixedpackage
mariadb-10.1removedpackage
percona-xtradb-cluster-5.5removedpackage

Примечания

  • Fixed in MariaDB 10.5.6, 10.4.15, 10.3.25, 10.2.34, 10.1.47

  • https://jira.mariadb.org/browse/MDEV-23884

  • https://www.percona.com/blog/2020/10/30/cve-2020-15180-affects-percona-xtradb-cluster/

EPSS

Процентиль: 89%
0.04602
Низкий

Связанные уязвимости

CVSS3: 9
ubuntu
около 4 лет назад

A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.

CVSS3: 9
redhat
больше 4 лет назад

A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.

CVSS3: 9
nvd
около 4 лет назад

A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.

CVSS3: 9
fstec
больше 4 лет назад

Уязвимость компонента mysql-wsrep СУБД MariaDB, связанная с ошибками обработки входных данных при выполнении синтаксического анализа кода, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

suse-cvrf
больше 4 лет назад

Security update for mariadb

EPSS

Процентиль: 89%
0.04602
Низкий