Description
In Cyrus SASL 2.1.17 through 2.1.27 before 2.1.28, plugins/sql.c does not escape the password for a SQL INSERT or UPDATE statement.A flaw was found in the SQL plugin shipped with Cyrus SASL. Failure to properly escape the SQL input allows a remote attacker to execute arbitrary SQL commands. This issue can lead to the escalation of privileges.
Solution(s)
centos-upgrade-cyrus-saslcentos-upgrade-cyrus-sasl-debuginfocentos-upgrade-cyrus-sasl-debugsourcecentos-upgrade-cyrus-sasl-develcentos-upgrade-cyrus-sasl-devel-debuginfocentos-upgrade-cyrus-sasl-gs2centos-upgrade-cyrus-sasl-gs2-debuginfocentos-upgrade-cyrus-sasl-gssapicentos-upgrade-cyrus-sasl-gssapi-debuginfocentos-upgrade-cyrus-sasl-ldapcentos-upgrade-cyrus-sasl-ldap-debuginfocentos-upgrade-cyrus-sasl-libcentos-upgrade-cyrus-sasl-lib-debuginfocentos-upgrade-cyrus-sasl-md5centos-upgrade-cyrus-sasl-md5-debuginfocentos-upgrade-cyrus-sasl-ntlmcentos-upgrade-cyrus-sasl-ntlm-debuginfocentos-upgrade-cyrus-sasl-plaincentos-upgrade-cyrus-sasl-plain-debuginfocentos-upgrade-cyrus-sasl-scramcentos-upgrade-cyrus-sasl-scram-debuginfocentos-upgrade-cyrus-sasl-sqlcentos-upgrade-cyrus-sasl-sql-debuginfo
ReferencesCESA-2022:0658CESA-2022:0666CVE-2022-24407