First published: Wed Apr 13 2022(Updated: )
Gin-vue-admin is a backstage management system based on vue and gin, which separates the front and rear of the full stack. The problem occurs in the following code in server/service/system/sys_auto_code_pgsql.go, which means that PostgreSQL must be used as the database for this vulnerability to occur. Users must: Require JWT login? and be using PostgreSQL to be affected. This issue has been resolved in version 2.5.1. There are no known workarounds.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Gin-vue-admin Project Gin-vue-admin | <2.5.1 | |
PostgreSQL PostgreSQL |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24844 is high with a CVSS score of 8.8.
CVE-2022-24844 affects Gin-vue-admin versions up to and including 2.5.1.
CVE-2022-24844 is classified as a CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability.
To fix CVE-2022-24844, it is recommended to update Gin-vue-admin to a version that includes the fix for this vulnerability.
More information about CVE-2022-24844 can be found in the official GitHub repository of Gin-vue-admin, including the specific PR and security advisory related to this vulnerability.