{"id":"CVE-2021-41395","details":"Teleport before 6.2.12 and 7.x before 7.1.1 allows attackers to control a database connection string, in some situations, via a crafted database name or username.","modified":"2026-03-14T11:14:51.569396Z","published":"2021-09-18T16:15:07.780Z","references":[{"type":"FIX","url":"https://github.com/gravitational/teleport/releases/tag/v6.2.12"},{"type":"FIX","url":"https://github.com/gravitational/teleport/releases/tag/v7.1.1"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gravitational/teleport","events":[{"introduced":"56547d4e3acab64d61ff8d534b60743384c13a1c"},{"fixed":"3849885944ca9af2d18fe57802cdc6b45729a9fe"},{"introduced":"c3977763d59206c7e7dc31fe1db0ad69b2b2e7c1"},{"fixed":"63f85cf2969baa358295be0c3b3aa75fdbf44252"}],"database_specific":{"versions":[{"introduced":"6.0"},{"fixed":"6.2.12"},{"introduced":"7.0"},{"fixed":"7.1.1"}]}}],"versions":["v6.0.0","v6.1.0-beta.1","v6.1.0-rc.1","v6.2.0","v6.2.0-alpha.1","v6.2.0-beta.1","v6.2.0-rc.1","v6.2.1","v6.2.10","v6.2.11","v6.2.2","v6.2.3","v6.2.4","v6.2.5","v6.2.6","v6.2.7","v6.2.8","v6.2.9","v7.0.0","v7.0.1","v7.0.2","v7.0.3","v7.1.0","v7.1.0-beta.1","v7.1.0-beta.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-41395.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N"}]}