Description
A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
References
https://github.com/layer5io/meshery/pull/2745
PatchThird Party Advisory
ProductVendor Advisory
https://github.com/layer5io/meshery/pull/2745
PatchThird Party Advisory
ProductVendor Advisory
CVSS impact metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 · Critical
Information
Source identifier
Vulnerability status
Modified
Published
2021-04-28T04:15:07.257Z
4 years agoLast modified
2024-11-21T05:06:21.980Z
1 year ago