In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2221 | In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection. |
Github GHSA |
GHSA-62pr-54gv-vg5g | SpringBlade vulnerable to SQL injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 02 Oct 2024 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-10-02T13:20:28.540Z
Reserved: 2023-08-22T00:00:00.000Z
Link: CVE-2023-40787
Updated: 2024-08-02T18:46:11.547Z
Status : Modified
Published: 2023-08-29T13:15:53.267
Modified: 2024-11-21T08:20:07.587
Link: CVE-2023-40787
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA