CVE-2024-53257: Vitess allows HTML injection in /debug/querylogz & /debug/env

4.9 CVSS

Description

Vitess is a database clustering system for horizontal scaling of MySQL. The /debug/querylogz and /debug/env pages for vtgate and vttablet do not properly escape user input. The result is that queries executed by Vitess can write HTML into the monitoring page at will. These pages are rendered using text/template instead of rendering with a proper HTML templating engine. This vulnerability is fixed in 21.0.1, 20.0.4, and 19.0.8.

Classification

CVE ID: CVE-2024-53257

CVSS Base Severity: MEDIUM

CVSS Base Score: 4.9

Affected Products

Vendor: vitessio

Product: vitess

Exploit Prediction Scoring System (EPSS)

EPSS Score: 0.04% (probability of being exploited)

EPSS Percentile: 11.44% (scored less or equal to compared to others)

EPSS Date: 2025-02-03 (when was this score calculated)

References

https://github.com/vitessio/vitess/security/advisories/GHSA-7mwh-q3xm-qh6p
https://github.com/vitessio/vitess/commit/2b71d1b5f8ca676beeab2875525003cd45096217

Timeline