First published: Mon Jul 29 2019(Updated: )
Apache VCL versions 2.1 through 2.5 do not properly validate form input when adding and removing VMs to and from hosts. The form data is then used in SQL statements. This allows for an SQL injection attack. Access to this portion of a VCL system requires admin level rights. Other layers of security seem to protect against malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Virtual Computing Lab | >=2.1<=2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11774 is classified as a high severity vulnerability due to its potential for SQL injection attacks.
To fix CVE-2018-11774, it is recommended to upgrade Apache VCL to version 2.6 or later which includes a patch for this vulnerability.
CVE-2018-11774 allows for SQL injection attacks which can lead to unauthorized data access and manipulation.
CVE-2018-11774 affects Apache VCL versions 2.1 through 2.5.
Organizations using affected versions of Apache VCL with admin-level access are at risk for CVE-2018-11774.