Логотип exploitDog
bind:CVE-2022-21687
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2022-21687

Количество 2

Количество 2

nvd логотип

CVE-2022-21687

около 4 лет назад

gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead to arbitrary file reads.

CVSS3: 6.8
EPSS: Низкий
github логотип

GHSA-rrp4-2xx3-mv29

около 4 лет назад

Command injection in gh-ost

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2022-21687

gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead to arbitrary file reads.

CVSS3: 6.8
0%
Низкий
около 4 лет назад
github логотип
GHSA-rrp4-2xx3-mv29

Command injection in gh-ost

CVSS3: 6.8
0%
Низкий
около 4 лет назад

Уязвимостей на страницу