Vulnerability Description
A SQL injection vulnerability exists in Meshery prior to version v0.6.179, enabling a remote attacker to retrieve sensitive information and execute arbitrary code through the “order” parameter
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Layer5 | Meshery | < 0.6.179 |
Related Weaknesses (CWE)
References
- https://github.com/meshery/meshery/commit/ffe00967acfe4444a5db08ff3a4cafb9adf601Patch
- https://github.com/meshery/meshery/compare/v0.6.178...v0.6.179Patch
- https://github.com/meshery/meshery/pull/9372Issue Tracking
- https://meshery.ioProduct
- https://github.com/meshery/meshery/commit/ffe00967acfe4444a5db08ff3a4cafb9adf601Patch
- https://github.com/meshery/meshery/compare/v0.6.178...v0.6.179Patch
- https://github.com/meshery/meshery/pull/9372Issue Tracking
- https://meshery.ioProduct
FAQ
What is CVE-2023-46575?
CVE-2023-46575 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A SQL injection vulnerability exists in Meshery prior to version v0.6.179, enabling a remote attacker to retrieve sensitive information and execute arbitrary code through the “order” parameter
How severe is CVE-2023-46575?
CVE-2023-46575 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-46575?
Check the references section above for vendor advisories and patch information. Affected products include: Layer5 Meshery.