GHSA-m738-584h-26p6

Suggest an improvement
Source
https://github.com/advisories/GHSA-m738-584h-26p6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/11/GHSA-m738-584h-26p6/GHSA-m738-584h-26p6.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-m738-584h-26p6
Aliases
Published
2022-11-01T19:00:29Z
Modified
2024-06-05T16:42:22.902491Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
IBAX go-ibax vulnerable to SQL injection
Details

A vulnerability, which was classified as critical, was found in IBAX go-ibax. This affects an unknown part of the file /api/v2/open/rowsInfo. The manipulation of the argument order leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212637 was assigned to this vulnerability.

Database specific
{
    "nvd_published_at": "2022-11-01T16:15:00Z",
    "cwe_ids": [
        "CWE-707",
        "CWE-89"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-24T21:00:54Z"
}
References

Affected packages

Go / github.com/IBAX-io/go-ibax

Package

Name
github.com/IBAX-io/go-ibax
View open source insights on deps.dev
Purl
pkg:golang/github.com/IBAX-io/go-ibax

Affected ranges

Type
SEMVER
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.2