Description
SQL injection can exist in a newly created part of the SpringbootCMS 1.0 background, and the parameters submitted by users are not filtered. As a result, special characters in parameters destroy the original logic of SQL statements. Attackers can use this vulnerability to execute any SQL statement.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-47611 | SQL injection can exist in a newly created part of the SpringbootCMS 1.0 background, and the parameters submitted by users are not filtered. As a result, special characters in parameters destroy the original logic of SQL statements. Attackers can use this vulnerability to execute any SQL statement. |
References
History
Tue, 24 Sep 2024 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-24T14:24:50.700Z
Reserved: 2023-09-18T00:00:00.000Z
Link: CVE-2023-43192
Updated: 2024-08-02T19:37:23.418Z
Status : Modified
Published: 2023-09-27T22:15:09.700
Modified: 2024-11-21T08:23:47.940
Link: CVE-2023-43192
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD