
Cloud Vulnerability DB
A community-led vulnerabilities database
Northern.tech CFEngine Enterprise before version 3.21.3 contains a SQL injection vulnerability in the Mission Portal login page. The vulnerability was discovered in version 3.6.0 and affects all versions up to 3.21.3. Fixed versions are 3.18.6 and 3.21.3 (NVD).
The vulnerability exists in the Mission Portal login page of the CFEngine hub. It has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N. The vulnerability is classified as CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection'). While the queried results are not directly visible in the server's response to the API request, attackers can craft special queries using logical conditions combined with PG_SLEEP function to perform time-based blind SQL injection attacks (Vendor Advisory).
The vulnerability allows attackers to extract the contents of the entire underlying database through time-based blind SQL injection techniques. This includes access to sensitive information such as access tokens and salted password hashes stored in the database (Vendor Advisory).
Users are strongly recommended to upgrade to CFEngine Enterprise versions 3.18.6 or 3.21.3, which contain the necessary security fixes. The vulnerability only affects the CFEngine hub, so installing the updated hub package is sufficient for remediation (Vendor Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."