{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-1741","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-03-30T19:01:43.863Z","datePublished":"2023-03-30T21:00:06.950Z","dateUpdated":"2024-08-02T05:57:25.054Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2024-02-13T07:54:20.161Z"},"title":"jeecg-boot Sleep Command SysDictMapper.java sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"n/a","product":"jeecg-boot","versions":[{"version":"3.5.0","status":"affected"}],"modules":["Sleep Command Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in jeecg-boot 3.5.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file SysDictMapper.java of the component Sleep Command Handler. The manipulation leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-224629 was assigned to this vulnerability."},{"lang":"de","value":"In jeecg-boot 3.5.0 wurde eine problematische Schwachstelle ausgemacht. Hierbei betrifft es unbekannten Programmcode der Datei SysDictMapper.java der Komponente Sleep Command Handler. Durch das Beeinflussen mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Umgesetzt werden kann der Angriff über das Netzwerk. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":4,"vectorString":"AV:N/AC:L/Au:S/C:N/I:N/A:P"}}],"timeline":[{"time":"2023-03-30T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-03-30T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-04-20T15:28:15.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"xuanshao (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.224629","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.224629","tags":["signature","permissions-required"]},{"url":"https://github.com/private-null/report/blob/main/README.md","tags":["broken-link","exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T05:57:25.054Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.224629","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.224629","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/private-null/report/blob/main/README.md","tags":["broken-link","exploit","x_transferred"]}]}]}}