Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Daptin fuzzy search injects unvalidated column name into raw SQL
Vulnerability Description
Daptin is a GraphQL/JSON-API headless CMS. Prior to version 0.11.5, processFuzzySearch in server/resource/resource_findallpaginated.go:1484 splits the user-supplied column parameter by comma and interpolates each segment directly into goqu.L(fmt.Sprintf("LOWER(%s) LIKE ?", prefix+col)) raw SQL with no column whitelist check. The entry point is GET /api/<entity> with operator=fuzzy (or fuzzy_any, fuzzy_all). Any authenticated user — including one who self-registered with no admin involvement — can read the entire database. This issue has been patched in version 0.11.5.
CVSS Information
N/A
Vulnerability Type
SQL命令中使用的特殊元素转义处理不恰当(SQL注入)
Vulnerability Title
daptin SQL注入漏洞
Vulnerability Description
daptin是Daptin开源的一个内容管理系统。 daptin 0.11.5之前版本存在SQL注入漏洞,该漏洞源于processFuzzySearch函数将用户提供的列参数按逗号分割并直接插入原始SQL中,且无列白名单检查,可能导致任何经过身份验证的用户读取整个数据库。
CVSS Information
N/A
Vulnerability Type
N/A