{"id":"CVE-2020-15180","details":"A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.","aliases":["BIT-mariadb-2020-15180","BIT-mariadb-min-2020-15180","BIT-mysql-client-2020-15180"],"modified":"2026-05-18T05:49:08.069188550Z","published":"2021-05-27T20:15:07.910Z","related":["ALSA-2020:5500","SUSE-RU-2023:3956-1","SUSE-RU-2023:4991-1","SUSE-SU-2020:3497-1","SUSE-SU-2020:3500-1","SUSE-SU-2020:3564-1","SUSE-SU-2020:3625-1","openSUSE-SU-2020:2090-1","openSUSE-SU-2020:2149-1","openSUSE-SU-2020:2254-1","openSUSE-SU-2024:11038-1"],"database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"9.0"},{"last_affected":"10.0"}],"cpes":["cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*"],"vendor_product":"debian:debian_linux","source":"CPE_FIELD"},{"extracted_events":[{"introduced":"5.6"},{"fixed":"5.6.49"},{"introduced":"5.7"},{"fixed":"5.7.31"},{"introduced":"8.0"},{"fixed":"8.0.21"}],"cpes":["cpe:2.3:a:galeracluster:galera_cluster_for_mysql:*:*:*:*:*:*:*:*"],"vendor_product":"galeracluster:galera_cluster_for_mysql","source":"CPE_FIELD"},{"extracted_events":[{"fixed":"5.6.49-28.42.2"},{"introduced":"5.7"},{"fixed":"5.7.31-31.45.2"},{"introduced":"8.0"},{"fixed":"8.0.20-11.2"}],"cpes":["cpe:2.3:a:percona:xtradb_cluster:*:*:*:*:*:*:*:*"],"vendor_product":"percona:xtradb_cluster","source":"CPE_FIELD"}]},"references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/10/msg00021.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202011-14"},{"type":"ADVISORY","url":"https://www.debian.org/security/2020/dsa-4776"},{"type":"REPORT","url":"https://bugzilla.redhat.com/show_bug.cgi?id=1894919"},{"type":"FIX","url":"https://www.percona.com/blog/2020/10/30/cve-2020-15180-affects-percona-xtradb-cluster/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/mariadb/server","events":[{"introduced":"c235de12ae3723b96944337bd89ad9cc87f21d8f"},{"fixed":"f4c85ef5ed0b2977fd5db61b166fd59764394234"},{"introduced":"9664240c948a92c22ccda0e1f5a420eb776ddcb1"},{"fixed":"a464917766dc513b524d16282b8f2c30f323abe5"},{"introduced":"20ae591abd0bfe1bfaee546989ee163f4ef832b1"},{"fixed":"a707c7f0dd628013bd0857ff7411b3ab6633cfa3"},{"introduced":"c761b43451d54eeeecdf3c102906fcce88d4e9d9"},{"fixed":"a6e451dc7272c408ace8b3fb4d86c79263f7247e"},{"introduced":"7c7f9bef28aa566557da31402142f6dd8298ddd2"},{"fixed":"5b8ab1934a10966336e66751bc13fc66923b02f6"}],"database_specific":{"extracted_events":[{"introduced":"10.1.0"},{"fixed":"10.1.47"},{"introduced":"10.2.0"},{"fixed":"10.2.34"},{"introduced":"10.3.0"},{"fixed":"10.3.25"},{"introduced":"10.4.0"},{"fixed":"10.4.15"},{"introduced":"10.5.0"},{"fixed":"10.5.6"}],"cpe":"cpe:2.3:a:mariadb:mariadb:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["mariadb-10.5.5","mariadb-10.4.14","mariadb-10.3.24","mariadb-10.2.33","mariadb-10.1.46","mariadb-10.5.4","mariadb-10.2.27","mariadb-10.3.21","mariadb-10.2.13","mariadb-10.5.2","mariadb-10.3.16","mariadb-10.2.31","mariadb-10.3.17","mariadb-10.3.10","mariadb-10.4.11","mariadb-10.2.30","mariadb-10.5.0","mariadb-10.4.10","mariadb-10.3.20","mariadb-10.2.29","mariadb-10.1.43","mariadb-10.4.9","mariadb-10.3.19","mariadb-10.2.28","mariadb-10.1.42","mariadb-10.3.18","mariadb-10.4.7","mariadb-10.2.26","mariadb-10.1.41","mariadb-10.2.25","mariadb-10.2.24","mariadb-10.4.5","mariadb-10.1.39","mariadb-10.4.4","mariadb-10.2.23","mariadb-10.4.3","mariadb-10.2.22","mariadb-10.1.38","mariadb-10.3.12","mariadb-10.2.21","mariadb-10.2.20","mariadb-10.2.19","mariadb-10.1.37","mariadb-10.2.18","mariadb-10.1.35","mariadb-10.2.16","mariadb-10.1.34","mariadb-10.3.7","mariadb-10.2.15","mariadb-10.1.33","mariadb-10.3.6","mariadb-10.2.14","mariadb-10.1.32","mariadb-10.3.5","mariadb-10.1.31","mariadb-10.3.4","mariadb-10.2.12","mariadb-10.1.30","mariadb-10.2.11","mariadb-10.1.29","mariadb-10.2.10","mariadb-10.3.2","mariadb-10.1.28","mariadb-10.1.27","mariadb-10.3.1","mariadb-10.1.26","mariadb-10.1.25","mariadb-10.1.24","mariadb-10.1.23","mariadb-10.2.5","mariadb-10.3.0","mariadb-10.1.22","mariadb-10.1.21","mariadb-10.1.20","mariadb-10.1.19","mariadb-10.1.18","mariadb-10.2.2","mariadb-10.1.17","mariadb-10.1.16","mariadb-10.2.1","mariadb-10.1.15","mariadb-10.1.14","mariadb-10.2.0","mariadb-10.1.13","mariadb-10.1.12","mariadb-10.1.11","mariadb-10.1.10","mariadb-10.1.9","mariadb-10.1.8","mariadb-10.1.7","mariadb-10.1.6","mariadb-10.1.5","mariadb-10.1.4","mariadb-10.1.3","mariadb-10.1.2","mariadb-10.1.0"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-15180.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H"}]}