CVE-2023-28424

Source
https://cve.org/CVERecord?id=CVE-2023-28424
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28424.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2023-28424
Aliases
  • GHSA-gc2x-86p3-mxg2
Published
2023-03-20T12:47:13.250Z
Modified
2025-11-29T14:10:10.266611Z
Severity
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
Summary
Soko SQL Injection vulnerability
Details

Soko if the code that powers packages.gentoo.org. Prior to version 1.0.2, the two package search handlers, Search and SearchFeed, implemented in pkg/app/handler/packages/search.go, are affected by a SQL injection via the q parameter. As a result, unauthenticated attackers can execute arbitrary SQL queries on https://packages.gentoo.org/. It was also demonstrated that primitive was enough to gain code execution in the context of the PostgreSQL container. The issue was addressed in commit 4fa6e4b619c0362728955b6ec56eab0e0cbf1e23y of version 1.0.2 using prepared statements to interpolate user-controlled data in SQL queries.

Database specific
{
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2023/28xxx/CVE-2023-28424.json",
    "cwe_ids": [
        "CWE-89"
    ]
}
References

Affected packages

Git / github.com/gentoo/soko

Affected ranges

Type
GIT
Repo
https://github.com/gentoo/soko
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.1.11
v0.1.12
v0.1.13
v0.1.14
v0.1.15
v0.1.16
v0.1.17
v0.1.18
v0.1.19
v0.1.20
v0.1.21
v0.1.22
v0.1.23
v0.2.0
v0.2.2
v0.2.3
v0.2.4
v0.2.5
v0.2.6
v1.*
v1.0.1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28424.json"