A vulnerability, which was classified as critical, was found in square squalor. This affects an unknown part. The manipulation leads to sql injection. Upgrading to version v0.0.0 is able to address this issue. The patch is named f6f0a47cc344711042eb0970cb423e6950ba3f93. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-217623.
References
Link | Resource |
---|---|
https://github.com/square/squalor/commit/f6f0a47cc344711042eb0970cb423e6950ba3f93 | Patch |
https://github.com/square/squalor/pull/76 | Patch |
https://github.com/square/squalor/releases/tag/v0.0.0 | Release Notes |
https://vuldb.com/?ctiid.217623 | Third Party Advisory |
https://vuldb.com/?id.217623 | Third Party Advisory |
https://github.com/square/squalor/commit/f6f0a47cc344711042eb0970cb423e6950ba3f93 | Patch |
https://github.com/square/squalor/pull/76 | Patch |
https://github.com/square/squalor/releases/tag/v0.0.0 | Release Notes |
https://vuldb.com/?ctiid.217623 | Third Party Advisory |
https://vuldb.com/?id.217623 | Third Party Advisory |
Configurations
History
21 Nov 2024, 05:29
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.2
v3 : 5.5 |
References | () https://github.com/square/squalor/commit/f6f0a47cc344711042eb0970cb423e6950ba3f93 - Patch | |
References | () https://github.com/square/squalor/pull/76 - Patch | |
References | () https://github.com/square/squalor/releases/tag/v0.0.0 - Release Notes | |
References | () https://vuldb.com/?ctiid.217623 - Third Party Advisory | |
References | () https://vuldb.com/?id.217623 - Third Party Advisory |
11 Apr 2024, 01:08
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
29 Feb 2024, 01:28
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-07 19:15
Updated : 2024-11-21 05:29
NVD link : CVE-2020-36645
Mitre link : CVE-2020-36645
CVE.ORG link : CVE-2020-36645
JSON object : View
Products Affected
square
- squalor
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')