First published: Fri Sep 22 2023(Updated: )
SQL injection vulnerbility in jeecgboot jeecg-boot v 3.0, 3.5.3 that allows a remote attacker to execute arbitrary code via a crafted request to the `report/jeecgboot/jmreport/queryFieldBySql` component.
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.jeecgframework.boot:jeecg-boot-common | <=3.5.3 | 3.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this SQL injection vulnerability is GHSA-rwhx-6hx7-pqc8.
The severity of vulnerability GHSA-rwhx-6hx7-pqc8 is critical with a CVSS score of 9.8.
This SQL injection vulnerability in jeecgboot jeecg-boot v 3.0, 3.5.3 occurs due to a lack of proper input validation, allowing a remote attacker to execute arbitrary code via a crafted request to the `report/jeecgboot/jmreport/queryFieldBySql` component.
The affected software of vulnerability GHSA-rwhx-6hx7-pqc8 is jeecgboot jeecg-boot v 3.0, 3.5.3.
To fix the SQL injection vulnerability in jeecgboot jeecg-boot v 3.0, 3.5.3, it is recommended to update to a patched version of the software or apply the necessary security patches provided by the vendor.