Vulnerability Description
SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruoyi | Ruoyi | <= 4.7.9 |
Related Weaknesses (CWE)
References
- https://gitee.com/y_project/RuoYi/commit/ddd858ca732618a472b10eaab2f8e4b45812ffcPatchPermissions Required
- https://gitee.com/y_project/RuoYi/issues/IBC976Issue Tracking
- https://github.com/mrlihd/CVE-2024-57521-SQL-Injection-PoC/blob/main/README.mdExploitThird Party Advisory
- https://github.com/mrlihd/Ruoyi-4.7.9-SQL-Injection-PoCExploitThird Party Advisory
FAQ
What is CVE-2024-57521?
CVE-2024-57521 is a vulnerability with a CVSS score of 10.0 (CRITICAL). SQL Injection vulnerability in RuoYi v.4.7.9 and before allows a remote attacker to execute arbitrary code via the createTable function in SqlUtil.java.
How severe is CVE-2024-57521?
CVE-2024-57521 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-57521?
Check the references section above for vendor advisories and patch information. Affected products include: Ruoyi Ruoyi.