зеркало из https://github.com/golang/vulndb.git
data/reports: add GO-2023-1494.yaml
Aliases: CVE-2014-125064, GHSA-g7mw-9pf9-p2pm Fixes golang/vulndb#1494 Change-Id: Ib99a2e0d06d5163fe17db7e095514d827fda3caf Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/464303 Run-TryBot: Julie Qiu <julieqiu@google.com> Reviewed-by: Julie Qiu <julieqiu@google.com> Auto-Submit: Julie Qiu <julieqiu@google.com> TryBot-Result: Gopher Robot <gobot@golang.org> Reviewed-by: Tatiana Bradley <tatianabradley@google.com>
This commit is contained in:
Родитель
25617d6e34
Коммит
97c35d169f
|
@ -0,0 +1,55 @@
|
|||
{
|
||||
"id": "GO-2023-1494",
|
||||
"published": "0001-01-01T00:00:00Z",
|
||||
"modified": "0001-01-01T00:00:00Z",
|
||||
"aliases": [
|
||||
"CVE-2014-125064",
|
||||
"GHSA-g7mw-9pf9-p2pm"
|
||||
],
|
||||
"details": "There is a potential for SQL injection through manipulate of the sqlStatement argument.",
|
||||
"affected": [
|
||||
{
|
||||
"package": {
|
||||
"name": "github.com/elgs/gosqljson",
|
||||
"ecosystem": "Go"
|
||||
},
|
||||
"ranges": [
|
||||
{
|
||||
"type": "SEMVER",
|
||||
"events": [
|
||||
{
|
||||
"introduced": "0"
|
||||
},
|
||||
{
|
||||
"fixed": "0.0.0-20220916234230-750f26ee23c7"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"database_specific": {
|
||||
"url": "https://pkg.go.dev/vuln/GO-2023-1494"
|
||||
},
|
||||
"ecosystem_specific": {
|
||||
"imports": [
|
||||
{
|
||||
"path": "github.com/elgs/gosqljson",
|
||||
"symbols": [
|
||||
"ExecDb",
|
||||
"QueryDbToArray",
|
||||
"QueryDbToArrayJson",
|
||||
"QueryDbToMap",
|
||||
"QueryDbToMapJson"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"type": "FIX",
|
||||
"url": "https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a"
|
||||
}
|
||||
],
|
||||
"schema_version": "1.3.1"
|
||||
}
|
|
@ -0,0 +1,22 @@
|
|||
modules:
|
||||
- module: github.com/elgs/gosqljson
|
||||
versions:
|
||||
- fixed: 0.0.0-20220916234230-750f26ee23c7
|
||||
vulnerable_at: 0.0.0-20140902115517-fa34a82f9316
|
||||
packages:
|
||||
- package: github.com/elgs/gosqljson
|
||||
symbols:
|
||||
- ExecDb
|
||||
- QueryDbToArray
|
||||
- QueryDbToMap
|
||||
derived_symbols:
|
||||
- QueryDbToArrayJson
|
||||
- QueryDbToMapJson
|
||||
description: There is a potential for SQL injection through manipulate of the sqlStatement
|
||||
argument.
|
||||
cves:
|
||||
- CVE-2014-125064
|
||||
ghsas:
|
||||
- GHSA-g7mw-9pf9-p2pm
|
||||
references:
|
||||
- fix: https://github.com/elgs/gosqljson/commit/2740b331546cb88eb61771df4c07d389e9f0363a
|
Загрузка…
Ссылка в новой задаче