GHSA-mjgw-f2c4-f8qj

Suggest an improvement
Source
https://github.com/advisories/GHSA-mjgw-f2c4-f8qj
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-mjgw-f2c4-f8qj/GHSA-mjgw-f2c4-f8qj.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-mjgw-f2c4-f8qj
Aliases
Published
2023-01-08T12:30:24Z
Modified
2023-11-08T04:07:08.607808Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
WebPA SQL Injection vulnerability
Details

A vulnerability was found in WebPA up to 3.1.1. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to sql injection. Upgrading to version 3.1.2 can to address this issue. The name of the patch is 8836c4f549181e885a68e0e7ca561fdbcbd04bf0. It is recommended to upgrade the affected component. The identifier VDB-217637 was assigned to this vulnerability.

Database specific
{
    "nvd_published_at": "2023-01-08T10:15:00Z",
    "github_reviewed_at": "2023-01-12T23:42:27Z",
    "severity": "CRITICAL",
    "github_reviewed": true,
    "cwe_ids": [
        "CWE-89"
    ]
}
References

Affected packages

Packagist / webpa/webpa

Package

Name
webpa/webpa
Purl
pkg:composer/webpa/webpa

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.1.2

Affected versions

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.0.5
v3.0.6
v3.0.7
v3.1.0
v3.1.1