First published: Wed Apr 28 2021(Updated: )
A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Layer5 Meshery | =0.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-31856 is critical with a severity value of 9.8.
CVE-2021-31856 affects Layer5 Meshery version 0.5.2.
CVE-2021-31856 is a SQL Injection vulnerability in the REST API of Layer5 Meshery 0.5.2 that allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint.
An attacker can exploit CVE-2021-31856 by sending malicious SQL commands through the order parameter in GetMesheryPatterns function of models/meshery_pattern_persister.go using the /experimental/patternfiles endpoint.
Yes, a fix for CVE-2021-31856 is available. Users should update to a version of Layer5 Meshery that is not affected by the vulnerability.