CVE-2017-20172

A vulnerability was found in ridhoq soundslike. It has been classified as critical. Affected is the function get_song_relations of the file app/api/songs.py. The manipulation leads to sql injection. The name of the patch is 90bb4fb667d9253d497b619b9adaac83bf0ce0f8. It is recommended to apply a patch to fix this issue. VDB-218490 is the identifier assigned to this vulnerability.
References
Link Resource
https://vuldb.com/?ctiid.218490 Permissions Required Third Party Advisory
https://github.com/ridhoq/soundslike/pull/5 Patch Third Party Advisory
https://vuldb.com/?id.218490 Third Party Advisory
https://github.com/ridhoq/soundslike/commit/90bb4fb667d9253d497b619b9adaac83bf0ce0f8 Patch Third Party Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:soundslike_project:soundslike:*:*:*:*:*:*:*:*

Information

Published : 2023-01-18 07:15

Updated : 2023-01-25 11:07


NVD link : CVE-2017-20172

Mitre link : CVE-2017-20172


JSON object : View

CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Advertisement

dedicated server usa

Products Affected

soundslike_project

  • soundslike