gh-ost is a triggerless online schema migration solution for MySQL. Versions prior to 1.1.3 are subject to an arbitrary file read vulnerability. The attacker must have access to the target host or trick an administrator into executing a malicious gh-ost command on a host running gh-ost, plus network access from host running gh-ost to the attack's malicious MySQL server. The `-database` parameter does not properly sanitize user input which can lead to arbitrary file reads.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2024-08-03T02:46:39.432Z
Reserved: 2021-11-16T00:00:00
Link: CVE-2022-21687

No data.

Status : Modified
Published: 2022-02-01T12:15:08.200
Modified: 2024-11-21T06:45:14.013
Link: CVE-2022-21687

No data.