Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS1nN213LTlwZjktcDJwbc4AAwzR
gosqljson SQL Injection vulnerability
A vulnerability, which was classified as critical, has been found in elgs gosqljson. This issue affects the function QueryDbToArray/QueryDbToMap/ExecDb
of the file gosqljson.go
. The manipulation of the argument sqlStatement leads to sql injection. The name of the patch is 2740b331546cb88eb61771df4c07d389e9f0363a. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217631.
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nN213LTlwZjktcDJwbc4AAwzR
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Critical
Classification: General
Published: over 1 year ago
Updated: about 1 year ago
CVSS Score: 9.8
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Identifiers: GHSA-g7mw-9pf9-p2pm, CVE-2014-125064
References:
- https://nvd.nist.gov/vuln/detail/CVE-2014-125064
- https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a
- https://vuldb.com/?ctiid.217631
- https://vuldb.com/?id.217631
- https://pkg.go.dev/vuln/GO-2023-1494
- https://github.com/advisories/GHSA-g7mw-9pf9-p2pm
Blast Radius: 8.3
Affected Packages
go:github.com/elgs/gosqljson
Dependent packages: 4Dependent repositories: 7
Downloads:
Affected Version Ranges: < 0.0.0-20220916234230-750f26ee23c7
Fixed in: 0.0.0-20220916234230-750f26ee23c7
All affected versions:
All unaffected versions: