
Cloud Vulnerability DB
A community-led vulnerabilities database
Teleport before 6.2.12 and 7.x before 7.1.1 contains a security vulnerability that allows attackers to control a database connection string in certain situations via a crafted database name or username (Teleport Release, Teleport Release). The vulnerability was discovered in September 2021 and affects the Database Access component of Teleport.
When connecting to a Postgres database, an attacker could craft a database name or username in a way that would allow them control over the resulting connection string. This could enable the attacker to probe connections to other reachable database servers and alter connection parameters, such as disabling TLS or connecting to a database authenticated by password. The vulnerability has a CVSS v3.1 base score of 6.5 MEDIUM (Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N) (NVD).
The vulnerability allows attackers to potentially probe connections to other reachable database servers and modify connection parameters. This could result in unauthorized access to databases, the ability to disable security features like TLS, or connect to password-authenticated databases (Teleport Release).
Users are strongly recommended to upgrade to the patched versions: Teleport 7.1.1 for 7.x users or Teleport 6.2.12 for 6.x users. If upgrading all components is not possible, priority should be given to upgrading tsh and Teleport agents that use reverse tunnels. The upgrade should follow the normal Teleport upgrade procedure (Teleport Release).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."