First published: Fri Sep 22 2023(Updated: )
SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the `report/jeecgboot/jmreport/queryFieldBySql` component.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jeecgframework.boot:jeecg-boot-common | <=3.5.3 | 3.6.0 |
JeecgBoot | =3.0 | |
JeecgBoot | =3.5.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-40989 is a SQL injection vulnerability in jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the `report/jeecgboot/jmreport/queryFieldBySql` component.
CVE-2023-40989 has a severity rating of 9.8, which is classified as critical.
jeecg-boot v 3.0 and 3.5.3 are affected by CVE-2023-40989.
A remote attacker can exploit CVE-2023-40989 by sending a crafted request to the `report/jeecgboot/jmreport/queryFieldBySql` component, which allows them to execute arbitrary code.
Yes, you can find more information about CVE-2023-40989 on the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2023-40989), [GitHub](https://github.com/Zone1-Z/CVE-2023-40989/blob/main/CVE-2023-40989), [Advisories](https://github.com/advisories/GHSA-rwhx-6hx7-pqc8)