Red Hat Hibernate ORM SQL注入漏洞

admin 2024-01-15 20:49:44 YS 来源:ZONE.CI 全球网 0 阅读模式
> Red Hat Hibernate ORM SQL注入漏洞

Red Hat Hibernate ORM SQL注入漏洞

CNNVD-ID编号 CNNVD-202011-1706 CVE编号 CVE-2020-25638
发布时间 2020-11-19 更新时间 2021-01-08
漏洞类型 SQL注入 漏洞来源 N/A
危险等级 高危 威胁类型 远程
厂商 N/A

漏洞介绍

Red Hat Hibernate ORM是美国红帽(Red Hat)公司的一款用于编写应用程序的对象/关系映射(ORM)框架。

Hibernate ORM 存在SQL注入漏洞,攻击者可利用该漏洞通过Hibernate ORM的注释使用SQL注入来读取或修改数据。

漏洞补丁

目前厂商已发布升级补丁以修复漏洞,详情请关注厂商主页:

参考网址

来源:MISC

链接:https://bugzilla.redhat.com/show_bug.cgi?id=1881353

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2021/01/msg00000.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160181/Red-Hat-Security-Advisory-2020-5174-01.html

来源:jvndb.jvn.jp

链接:https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-000074.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-25638

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160284/Red-Hat-Security-Advisory-2020-5254-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160346/Red-Hat-Security-Advisory-2020-5344-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4286/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2021.0008/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4230/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4263/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4451/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4405/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160837/Red-Hat-Security-Advisory-2020-5388-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160535/Red-Hat-Security-Advisory-2020-5533-01.html

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/Hibernate-ORM-SQL-injection-via-Comments-33940

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202011-1706

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0