Vulnerability Description
In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Bladex | Springblade | 3.6.0 |
Related Weaknesses (CWE)
References
- https://gist.github.com/kaliwin/9d6cf58bb6ec06765cdf7b75e13ee460Third Party Advisory
- https://sword.bladex.cn/Permissions Required
- https://gist.github.com/kaliwin/9d6cf58bb6ec06765cdf7b75e13ee460Third Party Advisory
- https://sword.bladex.cn/Permissions Required
FAQ
What is CVE-2023-40787?
CVE-2023-40787 is a vulnerability with a CVSS score of 9.8 (CRITICAL). In SpringBlade V3.6.0 when executing SQL query, the parameters submitted by the user are not wrapped in quotation marks, which leads to SQL injection.
How severe is CVE-2023-40787?
CVE-2023-40787 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2023-40787?
Check the references section above for vendor advisories and patch information. Affected products include: Bladex Springblade.