SQL Injection Affecting github.com/layer5io/meshery/server/handlers package, versions <0.7.22
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.04% (12th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-GOLANG-GITHUBCOMLAYER5IOMESHERYSERVERHANDLERS-7148573
- published 28 May 2024
- disclosed 27 May 2024
- credit @atorralba (Tony Torralba)
Introduced: 27 May 2024
CVE-2024-35181 Open this link in a new tabHow to fix?
Upgrade github.com/layer5io/meshery/server/handlers
to version 0.7.22 or higher.
Overview
github.com/layer5io/meshery/server/handlers is a collection of handlers (aka "HTTP middleware") for Meshery
Affected versions of this package are vulnerable to SQL Injection via the GetMeshSyncResourcesKinds
function that is exposed through /api/system/meshsync/resources/kinds
. An attacker can modify or access sensitive data, including performance profiles and Kubernetes configurations, by injecting SQL commands through the order
query parameter.
PoC
http://(server):9081/api/system/meshsync/resources/kinds?order=1%3bINSERT+INTO+performance_profiles+(metadata)+VALUES+("injected+data")--
References
CVSS Scores
version 3.1