In fastadmin V1.0.0.20191212_beta, when a user with administrator rights has logged in, a malicious parameter can be passed for SQL injection in URL /admin/ajax/weigh.
References
Link | Resource |
---|---|
https://github.com/karsonzhang/fastadmin/commit/e14008ca029d644e2486873fa22629a1d62a7380 | Patch Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-11-17T14:58:46
Updated: 2020-11-17T17:04:26
Reserved: 2020-08-13T00:00:00
Link: CVE-2020-21665
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-11-17T15:15:11.867
Modified: 2020-11-30T21:44:19.437
Link: CVE-2020-21665
JSON object: View
Redhat Information
No data.
CWE