BIT-mysql-client-2020-15180

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/mysql-client/BIT-mysql-client-2020-15180.json
JSON Data
https://api.test.osv.dev/v1/vulns/BIT-mysql-client-2020-15180
Aliases
Published
2024-03-06T11:10:32.376Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in wsrep_sst_method allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.

Database specific
{
    "cpes": [
        "cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*"
    ],
    "severity": "Critical"
}
References

Affected packages

Bitnami / mysql-client

Package

Name
mysql-client
Purl
pkg:bitnami/mysql-client

Severity

  • 9.0 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
10.1.0
Fixed
10.1.47
Introduced
10.2.0
Fixed
10.2.34
Introduced
10.3.0
Fixed
10.3.25
Introduced
10.4.0
Fixed
10.4.15
Introduced
10.5.0
Fixed
10.5.6