CVE-2023-38905: Jeecg-boot SQL Injection vulnerability
5.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.2171%
CWE
Published
8/17/2023
Updated
11/8/2023
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.jeecgframework.boot:jeecg-boot-parent | maven | <= 3.5.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from two key points: 1) The duplicate check endpoint constructs SQL queries using unsanitized user input parameters (tableName/fieldName). 2) The SQL injection filter fails to account for encoded whitespace and specific time-delay functions. The provided PoC shows successful exploitation via sleep(10) with %09 encoding, demonstrating that the filter's regex patterns (XSS_STR) and case conversion don't properly neutralize the threat vectors mentioned in the CVE (Benchmark, PG_Sleep, etc.). The vulnerable functions directly process attacker-controlled inputs that flow into SQL execution contexts.