CVE-2018-4056

An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.
Configurations

Configuration 1 (hide)

cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

07 Jun 2022, 17:18

Type Values Removed Values Added
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html - Third Party Advisory (MLIST) https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html - Mailing List, Third Party Advisory

Information

Published : 2019-02-05 18:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-4056

Mitre link : CVE-2018-4056

CVE.ORG link : CVE-2018-4056


JSON object : View

Products Affected

debian

  • debian_linux

coturn_project

  • coturn
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')