CVE-2018-25075
low-risk
Published 2023-01-15
A vulnerability classified as critical has been found in karsany OBridge up to 1.3. Affected is the function getAllStandaloneProcedureAndFunction of the file obridge-main/src/main/java/org/obridge/dao/ProcedureDao.java. The manipulation leads to sql injection. The complexity of an attack is rather high. The exploitability is told to be difficult. Upgrading to version 1.4 is able to address this issue. The name of the patch is 52eca4ad05f3c292aed3178b2f58977686ffa376. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-218376.
Do I need to act?
-
0.62% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.6/10
Medium
ADJACENT_NETWORK
/ HIGH complexity
Affected Products (1)
Obridge
Affected Vendors
References (8)
Release Notes
https://github.com/karsany/obridge/releases/tag/v1.4
Permissions Required
https://vuldb.com/?ctiid.218376
Third Party Advisory
https://vuldb.com/?id.218376
Release Notes
https://github.com/karsany/obridge/releases/tag/v1.4
Permissions Required
https://vuldb.com/?ctiid.218376
Third Party Advisory
https://vuldb.com/?id.218376
19
/ 100
low-risk
Severity
12/34 · Low
Exploitability
2/34 · Minimal
Exposure
5/34 · Minimal