First published: Sun Nov 27 2022(Updated: )
A SQL injection issue was discovered in AAA in OpenDaylight (ODL) before 0.16.5. The aaa-idm-store-h2/src/main/java/org/opendaylight/aaa/datastore/h2/RoleStore.java deleteRole function is affected when the API interface /auth/v1/roles/ is used.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Opendaylight | =0.15.0 | |
Linuxfoundation Opendaylight | =0.15.6 | |
Linuxfoundation Opendaylight | =0.16.0 | |
Linuxfoundation Opendaylight | =0.16.4 | |
=0.15.0 | ||
=0.15.6 | ||
=0.16.0 | ||
=0.16.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-45932 is classified as a medium severity SQL injection vulnerability.
To fix CVE-2022-45932, upgrade to OpenDaylight version 0.16.5 or later, where the vulnerability is resolved.
CVE-2022-45932 affects OpenDaylight versions 0.15.0, 0.15.6, 0.16.0, and 0.16.4.
CVE-2022-45932 allows an attacker to perform SQL injection through the deleteRole function in the RoleStore.
Yes, CVE-2022-45932 is specifically related to the /auth/v1/roles/ API interface in OpenDaylight.