GHSA-wp6c-29r3-jqw9

Suggest an improvement
Source
https://github.com/advisories/GHSA-wp6c-29r3-jqw9
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/07/GHSA-wp6c-29r3-jqw9/GHSA-wp6c-29r3-jqw9.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wp6c-29r3-jqw9
Aliases
Published
2023-07-28T15:30:23Z
Modified
2024-02-16T08:12:41.883681Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
SQL injection in jeecg-boot
Details

jeecg-boot v3.5.1 was discovered to contain a SQL injection vulnerability via the title parameter at /sys/dict/loadTreeData.

Database specific
{
    "nvd_published_at": "2023-07-28T15:15:12Z",
    "cwe_ids": [
        "CWE-89"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-28T20:55:29Z"
}
References

Affected packages

Maven / org.jeecgframework.boot:jeecg-boot-common

Package

Name
org.jeecgframework.boot:jeecg-boot-common
View open source insights on deps.dev
Purl
pkg:maven/org.jeecgframework.boot/jeecg-boot-common

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.5.3

Affected versions

3.*

3.4.0
3.4.2
3.4.3
3.4.4
3.5.0
3.5.1
3.5.2