Command injection in gh-ost
Description
Reviewed
Jan 31, 2022
Published to the GitHub Advisory Database
Feb 1, 2022
Published by the National Vulnerability Database
Feb 1, 2022
Last updated
Feb 3, 2023
Gh-ost version <= 1.1.2 allows users to inject DSN strings via the
-database
parameter.This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious
gh-ost
command on a host runninggh-ost
, plus network access from host runninggh-ost
to the attack's malicious MySQL server.Impact
This issue may lead to arbitrary local file read.
Patches
Fixed in 1.1.3+.
Workarounds
None
References
For more information
If you have any questions or comments about this advisory:
References