Skip to main content

CVE-2023-1454

Description

A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-223299.

NVD
Severity: CRITICAL
CVE ID: CVE-2023-1454
CVSS Score: 9.8
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
VulDB
Severity: MEDIUM
CVE ID: CVE-2023-1454
CVSS Score: 6.3
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2023-1454
gobysec

jeecg-boot unauthorized SQL Injection Vulnerability (CVE-2023-1454)

Refrence: GitHub

cjybao

jmreport/qurestSql 未授权SQL注入批量扫描poc

Refrence: GitHub

CKevens

CVE-2023-1454 jeecg-boot Unauthorized SQL injection vulnerability

Refrence: GitHub

BugFor-Pings

CVE-2023-1454漏洞检测脚本

Refrence: GitHub

padbergpete47

CVE-2023-1454,Jeecg-Boot 前台SQL注入,CVE-2023-1454批量检测

Refrence: GitHub

Sweelg

jmreport/qurestSql 未授权SQL注入批量扫描poc Jeecg-Boot是一款基于Spring Boot和Jeecg-Boot-Plus的快速开发平台,最新的jeecg-boot 3.5.0 中被爆出多个SQL注入漏洞。

Refrence: GitHub

shad0w0sec

JeecgBoot SQL(CVE-2023-1454)sqlmap 注入不出来的情况可以使用该脚本

Refrence: GitHub