Gh-ost version <= 1.1.2 allows users to inject DSN strings via the -database
parameter.
This is a low severity vulnerability as the attacker must have access to the target host or trick an administrator into executing a malicious gh-ost
command on a host running gh-ost
, plus network access from host running gh-ost
to the attack’s malicious MySQL server.
This issue may lead to arbitrary local file read.
Fixed in 1.1.3+.
None
If you have any questions or comments about this advisory: