Vulnerability Description
gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead to arbitrary file reads.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Github | Gh-Ost | < 1.1.3 |
Related Weaknesses (CWE)
References
- https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8fPatchThird Party Advisory
- https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29Third Party Advisory
- https://github.com/github/gh-ost/commit/a91ab042de013cfd8fbb633763438932d9080d8fPatchThird Party Advisory
- https://github.com/github/gh-ost/security/advisories/GHSA-rrp4-2xx3-mv29Third Party Advisory
FAQ
What is CVE-2022-21687?
CVE-2022-21687 is a vulnerability with a CVSS score of 6.8 (MEDIUM). gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or tri...
How severe is CVE-2022-21687?
CVE-2022-21687 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-21687?
Check the references section above for vendor advisories and patch information. Affected products include: Github Gh-Ost.