提出 #769775: CodePhiliaX Chat2DB <=0.3.7 SQL Injection情報

タイトルCodePhiliaX Chat2DB <=0.3.7 SQL Injection
説明Multiple high-severity SQL Injection vulnerabilities in DMDBManage.java component. When processing database export operations for DM databases (e.g., via /api/rdb/database/export endpoint), the application fails to validate or sanitize user-supplied parameters such as schemaName and tableName. These parameters are directly concatenated into SQL query templates using String.format(). This allows authenticated attackers to inject malicious SQL clauses, bypass schema isolation, and extract table structures, metadata, and sensitive data from other privileged schemas.
ソース⚠️ https://github.com/AnalogyC0de/public_exp/issues/21
ユーザー
 Ana10gy (UID 93358)
送信2026年03月02日 04:15 (2 月 ago)
モデレーション2026年03月14日 16:03 (12 days later)
ステータス承諾済み
VulDBエントリ351080 [CodePhiliaX Chat2DB 迄 0.3.7 Database Export DMDBManage.java SQLインジェクション]
ポイント20

Want to know what is going to be exploited?

We predict KEV entries!