First published: Wed Aug 05 2020(Updated: )
**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Skywalking | =6.5.0 | |
Apache Skywalking | =6.6.0 | |
Apache Skywalking | =7.0.0 | |
Apache Skywalking | =8.0.0 | |
Apache Skywalking | =8.0.1 | |
maven/org.apache.skywalking:oap-server | <8.1.0 | 8.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-13921 is a SQL injection vulnerability in the wildcard query cases when using H2/MySQL/TiDB as Apache SkyWalking storage.
CVE-2020-13921 has a severity rating of 9.8 (Critical).
Apache SkyWalking versions 6.5.0, 6.6.0, 7.0.0, 8.0.0, 8.0.1, and up to 8.1.0 are affected by CVE-2020-13921.
To resolve CVE-2020-13921, update to version 8.1.0 or higher of Apache SkyWalking.
You can find more information about CVE-2020-13921 on the following references: - [Openwall Mailing List](http://www.openwall.com/lists/oss-security/2020/08/05/3) - [GitHub Pull Request](https://github.com/apache/skywalking/pull/4970) - [Apache Mailing List](https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6@%3Cdev.skywalking.apache.org%3E)