Enhancement: cves/2021/CVE-2021-31856.yaml by mp
parent
a2c547183c
commit
1829bfc169
|
@ -1,10 +1,10 @@
|
||||||
id: CVE-2021-31856
|
id: CVE-2021-31856
|
||||||
|
|
||||||
info:
|
info:
|
||||||
name: Layer5 Meshery 0.5.2 SQLi
|
name: Layer5 Meshery 0.5.2 - SQL Injection
|
||||||
author: princechaddha
|
author: princechaddha
|
||||||
severity: critical
|
severity: critical
|
||||||
description: A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns
|
description: Layer5 Meshery 0.5.2 contains a SQL injection vulnerability in the REST API that allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns
|
||||||
in models/meshery_pattern_persister.go).
|
in models/meshery_pattern_persister.go).
|
||||||
reference:
|
reference:
|
||||||
- https://github.com/ssst0n3/CVE-2021-31856
|
- https://github.com/ssst0n3/CVE-2021-31856
|
||||||
|
@ -32,3 +32,5 @@ requests:
|
||||||
- type: status
|
- type: status
|
||||||
status:
|
status:
|
||||||
- 200
|
- 200
|
||||||
|
|
||||||
|
# Enhanced by mp on 2022/05/17
|
||||||
|
|
Loading…
Reference in New Issue