Description
An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.
Published: 2019-02-05
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1671-1 coturn security update
Debian DSA Debian DSA DSA-4373-1 coturn security update
EUVD EUVD EUVD-2018-15842 An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.
History

No history.

Subscriptions

Coturn Project Coturn
Debian Debian Linux
cve-icon MITRE

Status: PUBLISHED

Assigner: talos

Published:

Updated: 2024-09-17T00:05:30.162Z

Reserved: 2018-01-02T00:00:00.000Z

Link: CVE-2018-4056

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-02-05T18:29:00.850

Modified: 2024-11-21T04:06:39.483

Link: CVE-2018-4056

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses