Miggo Logo

CVE-2019-10141: Openstack ironic-inspector has SQL injection vulnerability in node_cache

8.3

CVSS Score
3.0

Basic Information

EPSS Score
0.74689%
Published
5/24/2022
Updated
9/27/2024
KEV Status
No
Technology
TechnologyPython

Technical Details

CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ironic-inspectorpip< 5.0.25.0.2
ironic-inspectorpip>= 5.1.0, < 6.0.36.0.3
ironic-inspectorpip>= 6.1.0, < 7.2.47.2.4
ironic-inspectorpip>= 8.0.0, < 8.0.38.0.3
ironic-inspectorpip>= 8.1.0, < 8.2.18.2.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability description explicitly names node_cache.find_node() as the vulnerable function. The commit diff shows this function previously built SQL queries via string concatenation (using 'text(stmt)') with user-controlled 'name' and 'value' parameters. The added test case 'test_input_filtering' specifically checks for SQL injection patterns, and the commit message states the fix was to replace raw SQL with SQLAlchemy's parameterized query builder.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility w*s *oun* in op*nst**k-ironi*-insp**tor *ll v*rsions *x*lu*in* *.*.*, *.*.*, *.*.*, *.*.* *n* *.*.*. * SQL-inj**tion vuln*r**ility w*s *oun* in op*nst**k-ironi*-insp**tor's no**_*****.*in*_no**(). T*is *un*tion m*k*s * SQL qu*ry usin*

Reasoning

T** vuln*r**ility **s*ription *xpli*itly n*m*s no**_*****.*in*_no**() *s t** vuln*r**l* *un*tion. T** *ommit *i** s*ows t*is *un*tion pr*viously *uilt SQL qu*ri*s vi* strin* *on**t*n*tion (usin* 't*xt(stmt)') wit* us*r-*ontroll** 'n*m*' *n* 'v*lu*' p