{ "id": "CVE-2024-35548", "sourceIdentifier": "cve@mitre.org", "published": "2024-05-28T21:16:31.680", "lastModified": "2024-08-02T04:15:55.577", "vulnStatus": "Awaiting Analysis", "cveTags": [ { "sourceIdentifier": "cve@mitre.org", "tags": [ "disputed" ] } ], "descriptions": [ { "lang": "en", "value": "A SQL injection vulnerability in Mybatis plus versions below 3.5.6 allows remote attackers to obtain database information via a Boolean blind injection. NOTE: the vendor's position is that this can only occur in a misconfigured application; the documentation discusses how to develop applications that avoid SQL injection." }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n SQL en Mybatis plus versiones inferiores a 3.5.6 permite a atacantes remotos obtener informaci\u00f3n de la base de datos mediante una inyecci\u00f3n ciega booleana. NOTA: la posici\u00f3n del proveedor es que esto s\u00f3lo puede ocurrir en una aplicaci\u00f3n mal configurada; la documentaci\u00f3n analiza c\u00f3mo desarrollar aplicaciones que eviten la inyecci\u00f3n SQL." } ], "metrics": {}, "references": [ { "url": "https://baomidou.com/reference/about-cve/", "source": "cve@mitre.org" }, { "url": "https://github.com/baomidou/mybatis-plus/issues/6167", "source": "cve@mitre.org" } ] }