First published: Tue Feb 05 2019(Updated: )
An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.
Credit: talos-cna@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/coturn | 4.5.1.1-1.1+deb10u2 4.5.2-3 4.6.1-1 | |
coturn | <4.5.0.9 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-4056 is considered a high severity vulnerability due to its potential for authentication bypass in the coTURN administrator web portal.
To fix CVE-2018-4056, update coTURN to version 4.5.1.1-1.1+deb10u2 or later.
CVE-2018-4056 affects coTURN versions prior to 4.5.0.9.
CVE-2018-4056 is an SQL injection vulnerability that allows unauthorized access to the TURN server administrator.
Yes, successful exploitation of CVE-2018-4056 could allow an attacker to gain administrator access to the TURN server, potentially leading to further attacks.