CVE-2023-52082

Source
https://cve.org/CVERecord?id=CVE-2023-52082
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52082.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-52082
Aliases
  • GHSA-rjwv-5j3m-p5x4
Published
2023-12-28T15:46:24.291Z
Modified
2026-02-05T09:14:34.621453Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Lychee is vulnerable to an SQL Injection in explain DB queries.
Details

Lychee is a free photo-management tool. Prior to 5.0.2, Lychee is vulnerable to an SQL injection on any binding when using mysql/mariadb. This injection is only active for users with the .env settings set to DBLOGSQL=true and DBLOGSQL_EXPLAIN=true. The defaults settings of Lychee are safe. The patch is provided on version 5.0.2. To work around this issue, disable SQL EXPLAIN logging.

Database specific
{
    "cwe_ids": [
        "CWE-89"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/52xxx/CVE-2023-52082.json"
}
References

Affected packages

Git / github.com/lycheeorg/lychee

Affected ranges

Type
GIT
Repo
https://github.com/lycheeorg/lychee
Events

Affected versions

v4.*
v4.10.0
v4.11.0
v4.11.1
v4.12.0
v4.13.0
v4.9.3
v4.9.4
v5.*
v5.0.0
v5.0.0-beta
v5.0.1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-52082.json"