| Название | Jeecgboot 3.9.1 SQL Injection |
|---|
| Описание | A logic flaw exists in the WAF's SQL injection detection mechanism, allowing attackers to bypass keyword filtering and execute arbitrary SQL queries. The vulnerability stems from a poorly constructed regular expression designed to detect SQL keywords and an asymmetric validation logic that fails to properly sanitize matched substrings. |
|---|
| Источник | ⚠️ https://www.yuque.com/la12138/pa2fpb/ab1i8wyeeg1zzgq5?singleDoc |
|---|
| Пользователь | Saul1213 (UID 94577) |
|---|
| Представление | 21.02.2026 13:26 (1 месяц назад) |
|---|
| Модерация | 06.03.2026 21:58 (13 days later) |
|---|
| Статус | принято |
|---|
| Запись VulDB | 349569 [JeecgBoot до 3.9.1 getDictItems isExistSqlInjectKeyword SQL-инъекция] |
|---|
| Баллы | 18 |
|---|