A vulnerability, which was classified as critical, was found in maku-boot up to 2.2.0. This affects the function doExecute of the file AbstractScheduleJob.java of the component Scheduled Task Handler. The manipulation leads to injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 446eb7294332efca2bfd791bc37281cedac0d0ff. It is recommended to apply a patch to fix this issue. The identifier VDB-215013 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://vuldb.com/?id.215013 | Third Party Advisory |
https://gitee.com/makunet/maku-boot/issues/I5ZUYI | Exploit Issue Tracking Patch Third Party Advisory |
https://gitee.com/makunet/maku-boot/commit/446eb7294332efca2bfd791bc37281cedac0d0ff | Patch Permissions Required Third Party Advisory |
Configurations
Information
Published : 2022-12-06 23:15
Updated : 2022-12-08 16:59
NVD link : CVE-2022-4322
Mitre link : CVE-2022-4322
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
maku
- maku-boot