CVE-2021-31856

Source
https://cve.org/CVERecord?id=CVE-2021-31856
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-31856.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-31856
Published
2021-04-28T06:15:07.257Z
Modified
2025-11-14T11:54:15.684191Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A SQL Injection vulnerability in the REST API in Layer5 Meshery 0.5.2 allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/mesherypatternpersister.go).

References

Affected packages

Git / github.com/layer5io/meshery

Affected ranges

Type
GIT
Repo
https://github.com/layer5io/meshery
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Affected versions

v0.*
v0.0.1
v0.0.2
v0.0.3
v0.0.4
v0.0.5
v0.0.6
v0.0.7
v0.0.8
v0.0.9
v0.1.0
v0.1.1
v0.1.2
v0.1.3
v0.1.4
v0.1.5
v0.1.6
v0.2.0
v0.2.1
v0.2.2
v0.2.3
v0.2.4
v0.3.0
v0.3.1
v0.3.10
v0.3.11
v0.3.12
v0.3.13
v0.3.14
v0.3.15
v0.3.16
v0.3.17
v0.3.18
v0.3.19
v0.3.2
v0.3.3
v0.3.4
v0.3.5
v0.3.6
v0.3.7
v0.3.8
v0.3.9
v0.4.0
v0.4.0-beta.1
v0.4.0-beta.2
v0.4.0-beta.3
v0.4.0-beta.4
v0.4.0-rc.0
v0.4.1
v0.4.10
v0.4.11
v0.4.12
v0.4.13
v0.4.14
v0.4.15
v0.4.16
v0.4.17
v0.4.18
v0.4.19
v0.4.2
v0.4.20
v0.4.21
v0.4.22
v0.4.23
v0.4.24
v0.4.25
v0.4.26
v0.4.27
v0.4.3
v0.4.4
v0.4.5
v0.4.6
v0.4.7
v0.4.8
v0.4.9
v0.5.0
v0.5.0-beta-1
v0.5.0-beta-2
v0.5.0-beta-3
v0.5.0-beta-4
v0.5.0-rc-1
v0.5.0-rc-2
v0.5.0-rc-3
v0.5.0-rc-4
v0.5.0-rc-5
v0.5.0-rc-6
v0.5.1
v0.5.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-31856.json"