First published: Wed Sep 27 2023(Updated: )
SQL injection can exist in a newly created part of the SpringbootCMS 1.0 background, and the parameters submitted by users are not filtered. As a result, special characters in parameters destroy the original logic of SQL statements. Attackers can use this vulnerability to execute any SQL statement.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jrecms Springbootcms | =1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-43192 is a vulnerability that allows SQL injection in the JFinalcms background, allowing attackers to execute arbitrary SQL statements.
The severity of CVE-2023-43192 is critical with a severity rating of 9.8.
The Jrecms Springbootcms software version 1.0 is affected by CVE-2023-43192.
CVE-2023-43192 allows attackers to submit parameters with special characters that can manipulate SQL statements and execute arbitrary SQL commands.
To fix CVE-2023-43192, ensure that user-submitted parameters are properly filtered to prevent SQL injection, and update to a patched version of Jrecms Springbootcms.