CVE-2023-34602: JeecgBoot vulnerable to SQL injection in queryTableDictItemsByCode
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.57034%
CWE
Published
6/19/2023
Updated
11/8/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.jeecgframework.boot:jeecg-boot-parent | maven | < 3.5.1 | 3.5.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The core vulnerability stems from two key points: 1) The AbstractQueryBlackListHandler's isPass method lacked proper input validation (specifically for hyphens in table/field names) prior to the patch, as shown by the added regex pattern in the fix. 2) The queryTableDictItemsByCode controller method serves as the entry point that accepts external parameters and interacts with the vulnerable validation logic. The patch adds critical validation checks in AbstractQueryBlackListHandler, confirming these were the missing security controls.