netease-youdao/qanything version 1.4.1 contains a vulnerability where unsafe data obtained from user input is concatenated in SQL queries, leading to SQL injection. The affected functions include `get_knowledge_base_name`, `from_status_to_status`, `delete_files`, and `get_file_by_status`. An attacker can exploit this vulnerability to execute arbitrary SQL queries, potentially stealing information from the database. The issue is fixed in version 1.4.2.
References
Link | Resource |
---|---|
https://github.com/netease-youdao/qanything/commit/a87354f09d93e95350fb45eb343dc75454387554 | Patch |
https://huntr.com/bounties/bc98983e-06cc-4a4b-be01-67e5010cb2c1 | Exploit Third Party Advisory |
Configurations
History
30 Jul 2025, 19:44
Type | Values Removed | Values Added |
---|---|---|
First Time |
Qanything
Qanything qanything |
|
CPE | cpe:2.3:a:qanything:qanything:1.4.1:*:*:*:*:*:*:* | |
References | () https://github.com/netease-youdao/qanything/commit/a87354f09d93e95350fb45eb343dc75454387554 - Patch | |
References | () https://huntr.com/bounties/bc98983e-06cc-4a4b-be01-67e5010cb2c1 - Exploit, Third Party Advisory |
15 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
13 Oct 2024, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-13 21:15
Updated : 2025-07-30 19:44
NVD link : CVE-2024-7099
Mitre link : CVE-2024-7099
CVE.ORG link : CVE-2024-7099
JSON object : View
Products Affected
qanything
- qanything
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')