Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-26945 #5328

Closed
iexhx opened this issue May 12, 2023 · 2 comments
Closed

CVE-2020-26945 #5328

iexhx opened this issue May 12, 2023 · 2 comments

Comments

@iexhx
Copy link

iexhx commented May 12, 2023

当前使用版本(必填,否则不予处理)

3.5.3.1

扫描出的漏洞信息
CVE-2020-26945 suppress

MyBatis before 3.5.6 mishandles deserialization of object streams.
CWE-502 Deserialization of Untrusted Data

CVSSv2:
Base Score: MEDIUM (5.1)
Vector: /AV:N/AC:H/Au:N/C:P/I:P/A:P
CVSSv3:
Base Score: HIGH (8.1)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

References:
MISC - mybatis/mybatis-3@mybatis-3.5.5...mybatis-3.5.6
MISC - mybatis/mybatis-3#2079
Vulnerable Software & Versions:

cpe:2.3:a:mybatis:mybatis:::::::: versions up to (excluding) 3.5.6

@iexhx
Copy link
Author

iexhx commented May 12, 2023

请问如何才能不被扫描出该漏洞

@qmdx
Copy link
Member

qmdx commented Jul 30, 2023

这是低版本 mybatis的问题,你使用新版本 MP 依赖高版本 mybatis 就可以了

@qmdx qmdx closed this as completed Jul 30, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants