Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-3276

Опубликовано: 04 окт. 2022
Источник: redhat
CVSS3: 8.4

Описание

Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

A flaw was in the puppetlabs-mysql module, where a Command injection can occur. This flaw allows a malicious actor to provide unsanitized input to the module.

Отчет

This condition is rare in most deployments of Puppet and Puppet Enterprise.

Дополнительная информация

Статус:

Important
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2132541Puppetlabs-mysql: Command Injection in the puppetlabs-mysql module

8.4 High

CVSS3

Связанные уязвимости

CVSS3: 8.4
ubuntu
больше 3 лет назад

Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

CVSS3: 8.4
nvd
больше 3 лет назад

Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

CVSS3: 8.4
debian
больше 3 лет назад

Command injection is possible in the puppetlabs-mysql module prior to ...

CVSS3: 8.8
github
больше 3 лет назад

Command injection is possible in the puppetlabs-mysql module prior to version 13.0.0. A malicious actor is able to exploit this vulnerability only if they are able to provide unsanitized input to the module. This condition is rare in most deployments of Puppet and Puppet Enterprise.

8.4 High

CVSS3