Description
In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2221 | In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection. |
Github GHSA |
GHSA-62pr-54gv-vg5g | SpringBlade vulnerable to SQL injection |
References
History
Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-02T13:20:28.540Z
Reserved: 2023-08-22T00:00:00.000Z
Link: CVE-2023-40787
Updated: 2024-08-02T18:46:11.547Z
Status : Modified
Published: 2023-08-29T13:15:53.267
Modified: 2024-11-21T08:20:07.587
Link: CVE-2023-40787
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA