First published: Tue Sep 13 2022(Updated: )
Archery v1.4.5 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Archerydms Archery | >=1.4.5<1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-38537.
The severity of CVE-2022-38537 is critical with a CVSS score of 9.8.
Archery versions 1.4.5 to 1.8.5 are affected by CVE-2022-38537.
An attacker can exploit CVE-2022-38537 by injecting malicious SQL queries through the start_file, end_file, start_time, and stop_time parameters in the binlog2sql interface of Archery.
Yes, archery v1.9.0 and later versions have fixed the SQL injection vulnerabilities of CVE-2022-38537.