CVE-2023-30465

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-30465
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-30465.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-30465
Aliases
Withdrawn
2024-05-15T05:32:55.473205Z
Published
2023-04-11T15:15:10Z
Modified
2023-11-29T09:57:15.299438Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N CVSS Calculator
Summary
[none]
Details

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.5.0. By manipulating the "orderType" parameter and the ordering of the returned content using an SQL injection attack, an attacker can extract the username of the   user with ID 1 from the "user" table, one character at a time.  Users are advised to upgrade to Apache InLong's 1.6.0 or cherry-pick [1] to solve it.

https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html

[1] https://github.com/apache/inlong/issues/7529 https://github.com/apache/inlong/issues/7529

References

Affected packages

Git / github.com/apache/inlong

Affected ranges

Type
GIT
Repo
https://github.com/apache/inlong
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Last affected

Affected versions

0.*

0.9.0-incubating-RC1

1.*

1.4.0-RC0
1.5.0-RC0