CVE-2018-4056

An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:06

Type Values Removed Values Added
References () https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html - Mailing List, Third Party Advisory
References () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 - Exploit, Third Party Advisory () https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 - Exploit, Third Party Advisory
References () https://www.debian.org/security/2019/dsa-4373 - Third Party Advisory () https://www.debian.org/security/2019/dsa-4373 - Third Party Advisory

Information

Published : 2019-02-05 18:29

Updated : 2024-11-21 04:06


NVD link : CVE-2018-4056

Mitre link : CVE-2018-4056

CVE.ORG link : CVE-2018-4056


JSON object : View

Products Affected

debian

  • debian_linux

coturn_project

  • coturn
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')