Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2023-30605

Опубликовано: 19 апр. 2023
Источник: nvd
CVSS3: 6.5
EPSS Низкий

Описание

Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. User input coming from the variable_name and variable_value parameter value in the sql/instance.py param_edit endpoint is passed to a set of methods in given SQL engine implementations, which concatenate user input unsafely into a SQL query and afterwards pass it to the query method of each database engine for execution. The affected methods are: set_variable in sql/engines/goinception.py which concatenates input which is passed to execution on the database in the sql/engines/goinception.py, get_variables in sql/engines/goinception.py which concatenates input which is passed to execution on the database in the sql/engines/goinception.py, set_variable in sql/engines/mysql.py which concatenates input which is passed to execution on the database in the sql/engines/mysql.py query, and

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:archerydms:archery:1.9.0:*:*:*:*:*:*:*

EPSS

Процентиль: 77%
0.00996
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-89

EPSS

Процентиль: 77%
0.00996
Низкий

6.5 Medium

CVSS3

Дефекты

CWE-89