Vulnerability Description
Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the kill_session interface. The project has released an update, please upgrade to v1.9.0 and above.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Archerydms | Archery | >= 1.4.0, < 1.9.0 |
Related Weaknesses (CWE)
References
- https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-theThird Party Advisory
- https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L149Third Party Advisory
- https://github.com/hhyo/Archery/issues/1841Third Party Advisory
- https://announcements.bybit.com/en-US/article/bybit-improves-the-security-of-theThird Party Advisory
- https://github.com/hhyo/Archery/blob/v1.8.5/sql/urls.py#L149Third Party Advisory
- https://github.com/hhyo/Archery/issues/1841Third Party Advisory
FAQ
What is CVE-2022-38542?
CVE-2022-38542 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Archery v1.4.0 to v1.8.5 was discovered to contain a SQL injection vulnerability via the ThreadIDs parameter in the kill_session interface. The project has released an update, please upgrade to v1.9.0...
How severe is CVE-2022-38542?
CVE-2022-38542 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2022-38542?
Check the references section above for vendor advisories and patch information. Affected products include: Archerydms Archery.