{"api_version":"1","generated_at":"2026-05-13T18:23:19+00:00","cve":"CVE-2018-4056","urls":{"html":"https://cve.report/CVE-2018-4056","api":"https://cve.report/api/cve/CVE-2018-4056.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-4056","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-4056"},"summary":{"title":"CVE-2018-4056","description":"An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.","state":"PUBLIC","assigner":"talos-cna@cisco.com","published_at":"2019-02-05 18:29:00","updated_at":"2022-06-07 17:18:00"},"problem_types":["CWE-89"],"metrics":[],"references":[{"url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html","name":"[debian-lts-announce] 20190211 [SECURITY] [DLA 1671-1] coturn security update","refsource":"MLIST","tags":["Third Party Advisory"],"title":"[SECURITY] [DLA 1671-1] coturn security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730","name":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"TALOS-2018-0730 ||  Cisco Talos Intelligence Group - Comprehensive Threat Intelligence","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2019/dsa-4373","name":"DSA-4373","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-4373-1 coturn","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-4056","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-4056","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"4056","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"coturn_project","cpe5":"coturn","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"4056","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"coturn_project","cpe5":"coturn","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"4056","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"4056","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"4056","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"4056","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-4056","qid":"690705","title":"Free Berkeley Software Distribution (FreeBSD) Security Update for turnserver (181beef6-2482-11e9-b4a3-00155d006b02)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"talos-cna@cisco.com","DATE_PUBLIC":"2018-01-29T00:00:00","ID":"CVE-2018-4056","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"coTURN","version":{"version_data":[{"version_value":"coTURN 4.5.0.5"}]}}]},"vendor_name":"Talos"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Improper Neutralization of Special Elements used in an SQL Command"}]}]},"references":{"reference_data":[{"name":"[debian-lts-announce] 20190211 [SECURITY] [DLA 1671-1] coturn security update","refsource":"MLIST","url":"https://lists.debian.org/debian-lts-announce/2019/02/msg00017.html"},{"name":"DSA-4373","refsource":"DEBIAN","url":"https://www.debian.org/security/2019/dsa-4373"},{"name":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730","refsource":"MISC","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2018-0730"}]},"impact":{"cvss":{"baseScore":9.1,"baseSeverity":"Critical","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.0"}}},"nvd":{"publishedDate":"2019-02-05 18:29:00","lastModifiedDate":"2022-06-07 17:18:00","problem_types":["CWE-89"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:coturn_project:coturn:*:*:*:*:*:*:*:*","versionEndExcluding":"4.5.0.9","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"4056","Ordinal":"119970","Title":"CVE-2018-4056","CVE":"CVE-2018-4056","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"4056","Ordinal":"1","NoteData":"An exploitable SQL injection vulnerability exists in the administrator web portal function of coTURN prior to version 4.5.0.9. A login message with a specially crafted username can cause an SQL injection, resulting in authentication bypass, which could give access to the TURN server administrator web portal. An attacker can log in via the external interface of the TURN server to trigger this vulnerability.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"4056","Ordinal":"2","NoteData":"2019-02-05","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"4056","Ordinal":"3","NoteData":"2019-02-12","Type":"Other","Title":"Modified"}]}}}