Описание
A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
Ссылки
- PatchThird Party Advisory
- ProductVendor Advisory
- PatchThird Party Advisory
- ProductVendor Advisory
Уязвимые конфигурации
Конфигурация 1
cpe:2.3:a:layer5:meshery:0.5.2:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.79924
Высокий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89
Связанные уязвимости
github
больше 3 лет назад
A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
EPSS
Процентиль: 99%
0.79924
Высокий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89