
Cloud Vulnerability DB
A community-led vulnerabilities database
Mingsoft MCMS version 5.2.8 was discovered to contain a SQL injection vulnerability in the /mdiy/model/delete URI via models Lists. The vulnerability was discovered and reported on July 20, 2022 (Gitee Issue).
The vulnerability exists in the route /${ms.manager.path}/mdiy/model/delete where the application processes the models object from frontend input. The application iterates through the ModelTableName values in the models object and passes them to the modelBiz.dropTable method. In the dropTable method implementation, the table parameter is directly concatenated into the SQL query without proper parameterization or sanitization, leading to SQL injection (Gitee Issue).
An attacker can exploit this vulnerability to perform arbitrary SQL operations on the database, including creating new tables, modifying existing data, or potentially accessing sensitive information. The vulnerability allows for stacked queries, meaning multiple SQL statements can be executed in sequence (Gitee Issue).
The vulnerability was addressed in version 5.2.9 of MCMS. Users should upgrade to this version or later to protect against this vulnerability (Gitee Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."