漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
GHSL-2024-014 Meshery SQL Injection vulnerability
Vulnerability Description
Meshery is an open source, cloud native manager that enables the design and management of Kubernetes-based infrastructure and applications. A SQL injection vulnerability in Meshery prior to version 0.7.22 may lead to arbitrary file write by using a SQL injection stacked queries payload, and the ATTACH DATABASE command. Additionally, attackers may be able to access and modify any data stored in the database, like performance profiles (which may contain session cookies), Meshery application data, or any Kubernetes configuration added to the system. The Meshery project exposes the function `GetAllEvents` at the API URL `/api/v2/events`. The sort query parameter read in `events_streamer.go` is directly used to build a SQL query in `events_persister.go`. Version 0.7.22 fixes this issue by using the `SanitizeOrderInput` function.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:N
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Vulnerability Title
Meshery 安全漏洞
Vulnerability Description
Meshery是一个应用软件。一种多服务网格管理平面,提供服务网格及其工作负载的生命周期,配置和性能管理。 Meshery 0.7.22之前版本存在安全漏洞,该漏洞源于存在SQL注入漏洞,攻击者可以通过SQL注入堆叠查询有效载荷和ATTACH DATABASE命令来执行任意文件写入。
CVSS Information
N/A
Vulnerability Type
N/A