Vulnerability Description
Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Archerydms | Archery | >= 1.8.3, <= 1.8.5 |
Related Weaknesses (CWE)
References
- https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-theThird Party Advisory
- https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L136Third Party Advisory
- https://github.com/hhyo/Archery/issues/1842ExploitIssue TrackingThird Party Advisory
- https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-theThird Party Advisory
- https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L136Third Party Advisory
- https://github.com/hhyo/Archery/issues/1842ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2022-38541?
CVE-2022-38541 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Archery v1.8.3 to v1.8.5 was discovered to contain multiple SQL injection vulnerabilities via the start_time and stop_time parameters in the my2sql interface.
How severe is CVE-2022-38541?
CVE-2022-38541 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-38541?
Check the references section above for vendor advisories and patch information. Affected products include: Archerydms Archery.