From 1829bfc169a91afb822103b03a9a1ff9b69012ec Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 17 May 2022 14:41:26 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-31856.yaml by mp --- cves/2021/CVE-2021-31856.yaml | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/cves/2021/CVE-2021-31856.yaml b/cves/2021/CVE-2021-31856.yaml index b24d75aa6b..49cf382cba 100644 --- a/cves/2021/CVE-2021-31856.yaml +++ b/cves/2021/CVE-2021-31856.yaml @@ -1,10 +1,10 @@ id: CVE-2021-31856 info: - name: Layer5 Meshery 0.5.2 SQLi + name: Layer5 Meshery 0.5.2 - SQL Injection author: princechaddha severity: critical - description: A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns + description: Layer5 Meshery 0.5.2 contains a SQL injection vulnerability in the REST API that allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go). reference: - https://github.com/ssst0n3/CVE-2021-31856 @@ -32,3 +32,5 @@ requests: - type: status status: - 200 + +# Enhanced by mp on 2022/05/17