An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.
References
Link | Resource |
---|---|
https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730 | Exploit Third Party Advisory |
https://www.debian.org/security/2019/dsa-4373 | Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html | Mailing List Third Party Advisory |
Information
Published : 2019-02-05 10:29
Updated : 2022-06-07 10:18
NVD link : CVE-2018-4056
Mitre link : CVE-2018-4056
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
debian
- debian_linux
coturn_project
- coturn