gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead to arbitrary file reads.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: GitHub_M

Published: 2022-02-01T11:56:17

Updated: 2022-02-01T11:56:17

Reserved: 2021-11-16T00:00:00


Link: CVE-2022-21687

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2022-02-01T12:15:08.200

Modified: 2022-02-04T17:09:05.193


Link: CVE-2022-21687

JSON object: View

cve-icon Redhat Information

No data.

CWE