First published: Mon Apr 01 2019(Updated: )
Pivotal Concourse version 5.0.0, contains an API that is vulnerable to SQL injection. An Concourse resource can craft a version identifier that can carry a SQL injection payload to the Concourse server, allowing the attacker to read privileged data.
Credit: security_alert@emc.com security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Pivotal Software Concourse | <5.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-3792 is high with a severity value of 7.5.
Pivotal Concourse version 5.0.0 becomes vulnerable to SQL injection due to an API that allows a crafted version identifier to carry a SQL injection payload.
Pivotal Concourse version 5.0.1 fixes CVE-2019-3792.
An attacker exploiting CVE-2019-3792 can read privileged data on the Concourse server.
More information about CVE-2019-3792 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-3792), [GitHub commit](https://github.com/concourse/concourse/commit/dc3d15ab6c3a69890c9985f9c875d4c2949be727), [Release Notes](https://github.com/concourse/concourse/blob/master/release-notes/v5.0.1.md#v501-note-1).