An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html | Mailing List Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 | Exploit Third Party Advisory |
https://www.debian.org/security/2019/dsa-4373 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html | Mailing List Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 | Exploit Third Party Advisory |
https://www.debian.org/security/2019/dsa-4373 | Third Party Advisory |
Configurations
History
21 Nov 2024, 04:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html - Mailing List, Third Party Advisory | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 - Exploit, Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4373 - Third Party Advisory |
Information
Published : 2019-02-05 18:29
Updated : 2024-11-21 04:06
NVD link : CVE-2018-4056
Mitre link : CVE-2018-4056
CVE.ORG link : CVE-2018-4056
JSON object : View
Products Affected
debian
- debian_linux
coturn_project
- coturn
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')