A vulnerability, which was classified as critical, has been found in y_project RuoYi 4.7.5. This issue affects some unknown processing of the file com/ruoyi/generator/controller/GenController. The manipulation leads to sql injection. The name of the patch is 167970e5c4da7bb46217f576dc50622b83f32b40. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-215975.
References
Link | Resource |
---|---|
https://github.com/luelueking/ruoyi-4.7.5-vuln-poc | Exploit Third Party Advisory |
https://vuldb.com/?id.215975 | Permissions Required Third Party Advisory |
https://gitee.com/y_project/RuoYi/commit/167970e5c4da7bb46217f576dc50622b83f32b40 | Permissions Required Third Party Advisory |
https://gitee.com/y_project/RuoYi/issues/I65V2B | Exploit Third Party Advisory |
Configurations
Information
Published : 2022-12-16 11:15
Updated : 2023-03-07 14:36
NVD link : CVE-2022-4566
Mitre link : CVE-2022-4566
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
ruoyi
- ruoyi