A vulnerability classified as critical was found in visegripped Stracker. Affected by this vulnerability is the function getHistory of the file doc_root/public_html/stracker/api.php. The manipulation of the argument symbol/startDate/endDate leads to sql injection. The name of the patch is 63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a. It is recommended to apply a patch to fix this issue. The identifier VDB-218377 was assigned to this vulnerability.
References
Link | Resource |
---|---|
https://vuldb.com/?ctiid.218377 | Third Party Advisory |
https://github.com/visegripped/stracker/pull/16 | Patch Third Party Advisory |
https://vuldb.com/?id.218377 | Third Party Advisory |
https://github.com/visegripped/stracker/commit/63e1b040373ee5b6c7d1e165ecf5ae1603d29e0a | Patch Third Party Advisory |
Configurations
Information
Published : 2023-01-15 00:15
Updated : 2023-01-24 08:33
NVD link : CVE-2022-4889
Mitre link : CVE-2022-4889
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
stracker_project
- stracker