
Cloud Vulnerability DB
A community-led vulnerabilities database
A critical SQL injection vulnerability was identified in IBAX go-ibax, specifically affecting the /api/v2/open/tablesInfo API endpoint. The vulnerability was discovered and reported on October 18, 2022 (GitHub Issue).
The vulnerability exists in two locations within the go-ibax/packages/api/database.go file. The first instance is on Line 92, where user input is directly interpolated into an SQL query string for table information retrieval. The second instance occurs on Line 120, where similar unsafe string interpolation is performed for column information queries. Both vulnerabilities allow for SQL injection through unvalidated user input parameters (GitHub Issue).
The SQL injection vulnerability allows attackers to execute arbitrary SQL commands on the underlying database. This was demonstrated through a proof of concept using pg_sleep(3) command, which successfully caused a 3-second delay in the server response, confirming the existence of the vulnerability (GitHub Issue).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."