CVE-2020-21665

Source
https://nvd.nist.gov/vuln/detail/CVE-2020-21665
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-21665.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2020-21665
Published
2020-11-17T15:15:11Z
Modified
2025-01-15T01:44:11.591222Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In fastadmin V1.0.0.20191212_beta, when a user with administrator rights has logged in, a malicious parameter can be passed for SQL injection in URL /admin/ajax/weigh.

References

Affected packages

Git / github.com/karsonzhang/fastadmin

Affected ranges

Type
GIT
Repo
https://github.com/karsonzhang/fastadmin
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed
Fixed

Affected versions

v0.*

v0.1.0.20170721_beta

v1.*

v1.0.0.20170808_beta
v1.0.0.20170816_beta
v1.0.0.20170915_beta
v1.0.0.20171026_beta
v1.0.0.20171206_beta
v1.0.0.20180117_beta
v1.0.0.20180119_beta
v1.0.0.20180204_beta
v1.0.0.20180222_beta
v1.0.0.20180308_beta
v1.0.0.20180310_beta
v1.0.0.20180314_beta
v1.0.0.20180327_beta
v1.0.0.20180401_beta
v1.0.0.20180406_beta
v1.0.0.20180417_beta
v1.0.0.20180506_beta
v1.0.0.20180513_beta
v1.0.0.20180618_beta
v1.0.0.20180630_beta
v1.0.0.20180806_beta
v1.0.0.20180911_beta
v1.0.0.20181031_beta
v1.0.0.20181127_beta
v1.0.0.20181210_beta
v1.0.0.20190111_beta
v1.0.0.20190301_beta
v1.0.0.20190318_beta
v1.0.0.20190407_beta
v1.0.0.20190410_beta
v1.0.0.20190418_beta
v1.0.0.20190510_beta
v1.0.0.20190628_beta
v1.0.0.20190705_beta
v1.0.0.20190930_beta
v1.0.0.20191101_beta
v1.0.0.20191212_beta