Enhancement: cves/2021/CVE-2021-31856.yaml by mp

patch-1
MostInterestingBotInTheWorld 2022-05-17 14:41:26 -04:00
parent a2c547183c
commit 1829bfc169
1 changed files with 4 additions and 2 deletions

View File

@ -1,10 +1,10 @@
id: CVE-2021-31856 id: CVE-2021-31856
info: info:
name: Layer5 Meshery 0.5.2 SQLi name: Layer5 Meshery 0.5.2 - SQL Injection
author: princechaddha author: princechaddha
severity: critical severity: critical
description: A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns description: Layer5 Meshery 0.5.2 contains a SQL injection vulnerability in the REST API that allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns
in models/meshery_pattern_persister.go). in models/meshery_pattern_persister.go).
reference: reference:
- https://github.com/ssst0n3/CVE-2021-31856 - https://github.com/ssst0n3/CVE-2021-31856
@ -32,3 +32,5 @@ requests:
- type: status - type: status
status: status:
- 200 - 200
# Enhanced by mp on 2022/05/17