dhis2 dhis_2 sql命令中使用的特殊元素转义处理不恰当(sql注入)

admin 2023-11-30 19:01:03 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
dhis2 dhis_2 sql命令中使用的特殊元素转义处理不恰当(sql注入)

CVE编号

CVE-2021-39179

利用情况

暂无

补丁情况

N/A

披露时间

2021-10-30
漏洞描述
DHIS 2 is an information system for data capture, management, validation, analytics and visualization. A SQL Injection vulnerability in the Tracker component in DHIS2 Server allows authenticated remote attackers to execute arbitrary SQL commands via unspecified vectors. This vulnerability affects the `/api/trackedEntityInstances` and `/api/trackedEntityInstances/query` API endpoints in all DHIS2 versions 2.34, 2.35, and 2.36. It also affects versions 2.32 and 2.33 which have reached _end of support_ - exceptional security updates have been added to the latest *end of support* builds for these versions. Versions 2.31 and older are unaffected. The system is vulnerable to attack only from users that are logged in to DHIS2, and there is no known way of exploiting the vulnerability without first being logged in as a DHIS2 user. The vulnerability is not exposed to a non-malicious user - the vulnerability requires a conscious attack to be exploited. A successful exploit of this vulnerability could allow the malicious user to read, edit and delete data in the DHIS2 instance. There are no known exploits of the security vulnerabilities addressed by these patch releases. Security patches are available in DHIS2 versions 2.32-EOS, 2.33-EOS, 2.34.7, 2.35.7, and 2.36.4. There is no straightforward known workaround for DHIS2 instances using the Tracker functionality other than upgrading the affected DHIS2 server to one of the patches in which this vulnerability has been fixed. For implementations which do NOT use Tracker functionality, it may be possible to block all network access to POST to the `/api/trackedEntityInstances`, and `/api/trackedEntityInstances/query` endpoints as a temporary workaround while waiting to upgrade.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://github.com/dhis2/dhis2-core/commit/16674ac75127b0e83691c6b1c9ce745e67ab58b6
https://github.com/dhis2/dhis2-core/pull/8771
https://github.com/dhis2/dhis2-core/security/advisories/GHSA-cmpc-frjv-rrmw
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 dhis2 dhis_2 * From (including) 2.32.0 Up to (including) 2.32.7
运行在以下环境
应用 dhis2 dhis_2 * From (including) 2.33.0 Up to (including) 2.33.9
运行在以下环境
应用 dhis2 dhis_2 * From (including) 2.35.0 Up to (excluding) 2.35.7
运行在以下环境
应用 dhis2 dhis_2 * From (including) 2.36.0 Up to (excluding) 2.36.4
CVSS3评分 8.8
  • 攻击路径 网络
  • 攻击复杂度 低
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 高
  • 保密性 高
  • 完整性 高
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE-ID 漏洞类型
CWE-89 SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0