vulnerability

Red Hat: CVE-2020-15180: CVE-2020-15180 mariadb: Insufficient SST method name check leading to code injection in mysql-wsrep (Multiple Advisories)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Dec 15, 2020
Added
Dec 21, 2020
Modified
Aug 11, 2025

Description

A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.

Solutions

redhat-upgrade-galeraredhat-upgrade-galera-debuginforedhat-upgrade-galera-debugsourceredhat-upgrade-judyredhat-upgrade-judy-debuginforedhat-upgrade-judy-debugsourceredhat-upgrade-mariadbredhat-upgrade-mariadb-backupredhat-upgrade-mariadb-backup-debuginforedhat-upgrade-mariadb-commonredhat-upgrade-mariadb-debuginforedhat-upgrade-mariadb-debugsourceredhat-upgrade-mariadb-develredhat-upgrade-mariadb-embeddedredhat-upgrade-mariadb-embedded-debuginforedhat-upgrade-mariadb-embedded-develredhat-upgrade-mariadb-errmsgredhat-upgrade-mariadb-gssapi-serverredhat-upgrade-mariadb-gssapi-server-debuginforedhat-upgrade-mariadb-oqgraph-engineredhat-upgrade-mariadb-oqgraph-engine-debuginforedhat-upgrade-mariadb-serverredhat-upgrade-mariadb-server-debuginforedhat-upgrade-mariadb-server-galeraredhat-upgrade-mariadb-server-utilsredhat-upgrade-mariadb-server-utils-debuginforedhat-upgrade-mariadb-testredhat-upgrade-mariadb-test-debuginfo
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.