Description


A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).

Related CPE's


References



https://meshery.io

ProductVendor Advisory


https://meshery.io

ProductVendor Advisory

Weaknesses



CWE-89

CVSS impact metrics


CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

9.8 · Critical

Information


Source identifier

[email protected]

Vulnerability status

Modified

Published

2021-04-28T04:15:07.257Z

4 years ago

Last modified

2024-11-21T05:06:21.980Z

1 year ago