vulnerability
Red Hat: CVE-2020-15180: CVE-2020-15180 mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | 2020-12-15 | 2020-12-21 | 2024-11-26 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
2020-12-15
Added
2020-12-21
Modified
2024-11-26
Description
A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.
Solution(s)
redhat-upgrade-galeraredhat-upgrade-galera-debuginforedhat-upgrade-galera-debugsourceredhat-upgrade-judyredhat-upgrade-judy-debuginforedhat-upgrade-judy-debugsourceredhat-upgrade-mariadbredhat-upgrade-mariadb-backupredhat-upgrade-mariadb-backup-debuginforedhat-upgrade-mariadb-commonredhat-upgrade-mariadb-debuginforedhat-upgrade-mariadb-debugsourceredhat-upgrade-mariadb-develredhat-upgrade-mariadb-embeddedredhat-upgrade-mariadb-embedded-debuginforedhat-upgrade-mariadb-embedded-develredhat-upgrade-mariadb-errmsgredhat-upgrade-mariadb-gssapi-serverredhat-upgrade-mariadb-gssapi-server-debuginforedhat-upgrade-mariadb-oqgraph-engineredhat-upgrade-mariadb-oqgraph-engine-debuginforedhat-upgrade-mariadb-serverredhat-upgrade-mariadb-server-debuginforedhat-upgrade-mariadb-server-galeraredhat-upgrade-mariadb-server-utilsredhat-upgrade-mariadb-server-utils-debuginforedhat-upgrade-mariadb-testredhat-upgrade-mariadb-test-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.