We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/my2sql.py#L36 Plugin my2sql has a problem with the filtering method of start_time and stop_time parameters, which leads to injection system command execution, resulting in a remote command execution vulnerability.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/binglog2sql.py#L43 Plugin binlog2sql has problems in the filtering method of start_file, end_file, start_time, stop_time parameters, which leads to injection system command execution, resulting in remote command execution vulnerability.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/archiver.py#L283 https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/pt_archiver.py#L41 Plugin archiver do not filter where parameter, which leads to the execution of injectable system commands, resulting in a remote command execution vulnerability. Users in the DBA role can create malicious workflow and execute the workflow.
where
Improper use of shlex.quote can cause quote bypassing with one more quote, and cause remote command execution.
No response
v1.8.5
Docker
The text was updated successfully, but these errors were encountered:
2fc1d16
插件执行命令采用传参替代字符串拼接 (hhyo#1840)
8a957a1
* 插件执行全部采用shell=False的形式,规避安全风险 fix hhyo#1842 (cherry picked from commit 2fc1d16)
No branches or pull requests
重现步骤
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/my2sql.py#L36
Plugin my2sql has a problem with the filtering method of start_time and stop_time parameters, which leads to injection system command execution, resulting in a remote command execution vulnerability.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/binglog2sql.py#L43
Plugin binlog2sql has problems in the filtering method of start_file, end_file, start_time, stop_time parameters, which leads to injection system command execution, resulting in remote command execution vulnerability.
https://github.com/hhyo/Archery/blob/v1.8.5/sql/archiver.py#L283
https://github.com/hhyo/Archery/blob/v1.8.5/sql/plugins/pt_archiver.py#L41
Plugin archiver do not filter
where
parameter, which leads to the execution of injectable system commands, resulting in a remote command execution vulnerability. Users in the DBA role can create malicious workflow and execute the workflow.预期外的结果
Improper use of shlex.quote can cause quote bypassing with one more quote, and cause remote command execution.
日志文本
No response
版本
v1.8.5
部署方式
Docker
是否还有其他可以辅助定位问题的信息?比如数据库版本等
No response
The text was updated successfully, but these errors were encountered: