漏洞标题
WeGIA中'documento_excluir.php'接口'id_funcionario'参数存在SQL注入漏洞
漏洞描述信息
WeGIA是一款以葡萄牙语用户为主的开源Web管理软件。在WeGIA应用程序的`documento_excluir.php`端点中发现了一个SQL注入漏洞。此漏洞可能导致攻击者执行任意SQL查询,从而获得对敏感信息的未经授权访问。此问题已在版本3.2.13中得到解决,建议所有用户进行升级。目前尚未发现对此漏洞的解决方法。
CVSS信息
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
漏洞标题
SQL Injection endpoint 'documento_excluir.php' parameter 'id_funcionario' in WeGIA
漏洞描述信息
WeGIA is an open source Web Manager for Institutions with a focus on Portuguese language users. A SQL Injection vulnerability was discovered in the WeGIA application, `documento_excluir.php` endpoint. This vulnerability could allow an attacker to execute arbitrary SQL queries, allowing unauthorized access to sensitive information. This issue has been addressed in version 3.2.13 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
CVSS信息
N/A
漏洞类别
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)