9
CVE-2020-15180
- EPSS 4.6%
- Published 27.05.2021 20:15:07
- Last modified 21.11.2024 05:05:01
- Source security-advisories@github.com
- Teams watchlist Login
- Open Login
A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.
Data is provided by the National Vulnerability Database (NVD)
Debian ≫ Debian Linux Version9.0
Debian ≫ Debian Linux Version10.0
Percona ≫ Xtradb Cluster Version < 5.6.49-28.42.2
Percona ≫ Xtradb Cluster Version >= 5.7 < 5.7.31-31.45.2
Percona ≫ Xtradb Cluster Version >= 8.0 < 8.0.20-11.2
Galeracluster ≫ Galera Cluster For Mysql Version >= 5.6 < 5.6.49
Galeracluster ≫ Galera Cluster For Mysql Version >= 5.7 < 5.7.31
Galeracluster ≫ Galera Cluster For Mysql Version >= 8.0 < 8.0.21
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 4.6% | 0.888 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9 | 2.2 | 6 |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
nvd@nist.gov | 6.8 | 8.6 | 6.4 |
AV:N/AC:M/Au:N/C:P/I:P/A:P
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.