漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
Apache InLong: SQL injection in apache inLong 1.5.0
漏洞信息
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Apache Software Foundation Apache InLong.This issue affects Apache InLong: from 1.4.0 through 1.5.0. By manipulating the "orderType" parameter and the ordering of the returned content using an SQL injection attack, an attacker can extract the username of the user with ID 1 from the "user" table, one character at a time. Users are advised to upgrade to Apache InLong's 1.6.0 or cherry-pick [1] to solve it. https://programmer.help/blogs/jdbc-deserialization-vulnerability-learning.html [1] https://github.com/apache/inlong/issues/7529 https://github.com/apache/inlong/issues/7529
漏洞信息
N/A
漏洞
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞
Apache InLong SQL注入漏洞
漏洞信息
Apache InLong是美国阿帕奇(Apache)基金会的一站式的海量数据集成框架。提供自动化、安全、可靠的数据传输能力。 Apache InLong 1.4.0 到 1.5.0版本存在SQL注入漏洞,该漏洞源于程序中使用的特殊元素的不当中和,攻击者利用该漏洞可以通过orderType参数进行SQL 注入攻击。
漏洞信息
N/A
漏洞
N/A