cve/2023/CVE-2023-3163.md

19 lines
866 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-3163](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3163)
![](https://img.shields.io/static/v1?label=Product&message=RuoYi&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%204.7.0%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-400%20Resource%20Consumption&color=brighgreen)
### Description
A vulnerability was found in y_project RuoYi up to 4.7.7. It has been classified as problematic. Affected is the function filterKeyword. The manipulation of the argument value leads to resource consumption. VDB-231090 is the identifier assigned to this vulnerability.
### POC
#### Reference
- https://gitee.com/y_project/RuoYi/issues/I78DOR
#### Github
- https://github.com/George0Papasotiriou/CVE-2023-3163-SQL-Injection-Prevention
- https://github.com/nomi-sec/PoC-in-GitHub