Gh-ost version <= 1.1.2 allows users to inject DSN strings via the -database
parameter.
This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious gh-ost
command on a host running gh-ost
, plus network access from host running gh-ost
to the attack's malicious MySQL server.
Impact
This issue may lead to arbitrary local file read.
Patches
Fixed in 1.1.3+.
Workarounds
None
References
For more information
If you have any questions or comments about this advisory:
Gh-ost version <= 1.1.2 allows users to inject DSN strings via the
-database
parameter.This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious
gh-ost
command on a host runninggh-ost
, plus network access from host runninggh-ost
to the attack's malicious MySQL server.Impact
This issue may lead to arbitrary local file read.
Patches
Fixed in 1.1.3+.
Workarounds
None
References
For more information
If you have any questions or comments about this advisory: