2024-08-02 06:03:15 +00:00

36 lines
1.4 KiB
JSON

{
"id": "CVE-2024-35548",
"sourceIdentifier": "cve@mitre.org",
"published": "2024-05-28T21:16:31.680",
"lastModified": "2024-08-02T04:15:55.577",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability in Mybatis plus versions below 3.5.6 allows remote attackers to obtain database information via a Boolean blind injection. NOTE: the vendor's position is that this can only occur in a misconfigured application; the documentation discusses how to develop applications that avoid SQL injection."
},
{
"lang": "es",
"value": "Una vulnerabilidad de inyecci\u00f3n SQL en Mybatis plus versiones inferiores a 3.5.6 permite a atacantes remotos obtener informaci\u00f3n de la base de datos mediante una inyecci\u00f3n ciega booleana. NOTA: la posici\u00f3n del proveedor es que esto s\u00f3lo puede ocurrir en una aplicaci\u00f3n mal configurada; la documentaci\u00f3n analiza c\u00f3mo desarrollar aplicaciones que eviten la inyecci\u00f3n SQL."
}
],
"metrics": {},
"references": [
{
"url": "https://baomidou.com/reference/about-cve/",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/baomidou/mybatis-plus/issues/6167",
"source": "cve@mitre.org"
}
]
}