CVE-2022-22881: SQL Injection in Jeecg-boot
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.75775%
CWE
Published
2/17/2022
Updated
2/3/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jeecgframework.boot:jeecg-boot-base | maven | <= 3.0 | |
org.jeecgframework.boot:jeecg-boot-base-core | maven | <= 3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability is explicitly tied to the /sys/user/queryUserComponentData endpoint and the 'code' parameter. In typical Spring Boot architectures, this endpoint would map to a controller method (e.g., SysUserController.queryUserComponentData). SQL injection occurs when user-supplied input (the 'code' parameter) is directly interpolated into SQL queries. The lack of sanitization or use of prepared statements in this function aligns with the described CWE-89 vulnerability. While the exact code is unavailable, the endpoint structure and parameter-specific exploitation vector strongly indicate this controller method as the vulnerable component.