First published: Fri Nov 24 2023(Updated: )
A SQL injection vulnerability in Meshery before 0.6.179 allows a remote attacker to obtain sensitive information and execute arbitrary code via the order parameter.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
go/github.com/layer5io/meshery | <0.6.179 | 0.6.179 |
Layer5 Meshery | <0.6.179 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-46575 is critical with a severity value of 9.1.
The affected software for CVE-2023-46575 is Meshery before version 0.6.179.
An attacker can exploit this vulnerability in CVE-2023-46575 by using a remote SQL injection attack to obtain sensitive information and execute arbitrary code via the order parameter.
Yes, the fix for CVE-2023-46575 is to update to Meshery version 0.6.179 or later.
You can find more information about CVE-2023-46575 on the Meshery website, GitHub repository, and the NIST National Vulnerability Database.