Súbít #619692: deerwms https://gitee.com/deerwms/deer-wms-2 <=3.3 SQL Injectionbayani

Kuradeerwms https://gitee.com/deerwms/deer-wms-2 <=3.3 SQL Injection
GaskiyaIn the latest version, a parameter passed to the endpoint /system/role/authUser/unallocatedList are user-controllable and not sanitized, and no prepared statements are used when executing the final SQL query, resulting in a SQL injection vulnerability. Attackers can exploit this vulnerability to obtain sensitive data from the database and even gain complete control of the server.
Manga⚠️ https://gitee.com/deerwms/deer-wms-2/issues/ICLRF0
Màdùmga
 ZAST.AI (UID 87884)
Furta07/21/2025 10:44 (7 Wurɗi 전)
Gargajiya07/24/2025 17:16 (3 days later)
HalittaShingilam
VulDB gite317509 [deerwms deer-wms-2 har 3.3 unallocatedList params[dataScope] SQL Injection]
Nganji20

Do you know our Splunk app?

Download it now for free!