| Название | deerwms https://gitee.com/deerwms/deer-wms-2 <=3.3 SQL Injection |
|---|
| Описание | In the latest version, a parameter passed to the endpoint /system/role/export are user-controllable and not sanitized, and no prepared statements are used when executing the final SQL query, resulting in a SQL injection vulnerability. Attackers can exploit this vulnerability to obtain sensitive data from the database and even gain complete control of the server. |
|---|
| Источник | ⚠️ https://gitee.com/deerwms/deer-wms-2/issues/ICLQQG |
|---|
| Пользователь | ZAST.AI (UID 87884) |
|---|
| Представление | 21.07.2025 10:48 (9 месяцы назад) |
|---|
| Модерация | 25.07.2025 09:00 (4 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 317575 [deerwms deer-wms-2 до 3.3 /system/role/export params[dataScope] SQL-инъекция] |
|---|
| Баллы | 19 |
|---|