SQL Injection Affecting ironic-inspector package, versions [,8.2.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.9% (75th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-PYTHON-IRONICINSPECTOR-174759
  • published21 May 2019
  • disclosed15 May 2019
  • creditZane Bitter

Introduced: 15 May 2019

CVE-2019-10141  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade ironic-inspector to version 8.2.1 or higher.

Overview

ironic-inspector is a hardware introspection daemon for OpenStack Ironic.

Affected versions of this package are vulnerable to SQL Injection. The node_cache.find_node() function generates a SQL query using unfiltered data from a server's reporting inspection results. Due to the API being unauthenticated, the flaw could be exploited by an attacker with access to the network on which ironic-inspector is listening.

Because of how the results of the query are used, it is not possible to exploit this vulnerability to exfiltrate data. However, it could be exploited to conduct Denial of Service (DoS) attacks by passing malicious data such as \'; DROP DATABASE;\

CVSS Base Scores

version 3.1