# N/A
## 概述
使用H2/MySQL/TiDB作为Apache SkyWalking存储时,通过GraphQL协议查询元数据存在SQL注入漏洞,这可能导致访问未预期的数据。
## 影响版本
- Apache SkyWalking 6.0.0 到 6.6.0
- Apache SkyWalking 7.0.0
## 细节
H2/MySQL/TiDB存储实现没有使用适当的方式设置SQL参数,这导致了SQL注入漏洞。
## 影响
该漏洞可能导致攻击者通过SQL注入技术访问未预期的数据。
# | POC 描述 | 源链接 | 神龙链接 |
---|---|---|---|
1 | CVE-2020-9483 OR CVE-2020-13921 | https://github.com/shanika04/apache_skywalking | POC详情 |
2 | PoC of SQL Injection vul(CVE-2020-9483,Apache SkyWalking) | https://github.com/Neko-chanQwQ/CVE-2020-9483 | POC详情 |
3 | When using H2/MySQL/TiDB as Apache SkyWalking storage and a metadata query through GraphQL protocol, there is a SQL injection vulnerability which allows access to unexpected data. Apache SkyWalking 6.0.0 to 6.6.0, 7.0.0 H2/MySQL/TiDB storage implementations don't use the appropriate way to set SQL parameters. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2020/CVE-2020-9483.yaml | POC详情 |
4 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20SkyWalking%207.0.0%20graphql%20SQL%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E%20CVE-2020-9483.md | POC详情 |
5 | None | https://github.com/tuaandatt/CVE-2020-9483---Apache-Skywalking-8.3.0 | POC详情 |
暂无评论