First published: Mon Jul 29 2019(Updated: )
Apache VCL versions 2.1 through 2.5 do not properly validate cookie input when determining what node (if any) was previously selected in the privilege tree. The cookie data is then used in an SQL statement. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Virtual Computing Lab | >=2.1<=2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11772 is classified as a high severity vulnerability due to its potential to allow SQL injection attacks.
To fix CVE-2018-11772, upgrade Apache Virtual Computing Lab to version 2.6 or later where the cookie input validation has been improved.
CVE-2018-11772 affects Apache VCL versions 2.1 through 2.5.
CVE-2018-11772 allows for an SQL injection attack when improperly validated cookie input is used in SQL statements.
Yes, administrative access is required to exploit the SQL injection vulnerability in CVE-2018-11772.