| Title | deerwms https://gitee.com/deerwms/deer-wms-2 <=3.3 SQL Injection |
|---|
| Description | In the latest version, a parameter passed to the endpoint /system/dept/list are user-controllable and not sanitized, and no prepared statements are used when executing the final SQL query, resulting in a SQL injection vulnerability. Attackers can exploit this vulnerability to obtain sensitive data from the database and even gain complete control of the server. |
|---|
| Source | ⚠️ https://gitee.com/deerwms/deer-wms-2/issues/ICLQKV |
|---|
| User | ZAST.AI (UID 87884) |
|---|
| Submission | 07/21/2025 10:49 (9 months ago) |
|---|
| Moderation | 07/25/2025 09:00 (4 days later) |
|---|
| Status | Accepted |
|---|
| VulDB entry | 317576 [deerwms deer-wms-2 up to 3.3 /system/dept/list params[dataScope] sql injection] |
|---|
| Points | 19 |
|---|