{"id":"CVE-2020-13921","details":"**Resolved** Only when using H2/MySQL/TiDB as Apache SkyWalking storage, there is a SQL injection vulnerability in the wildcard query cases.","aliases":["GHSA-grpf-gg7v-5g5h","PYSEC-2020-342"],"modified":"2026-04-11T21:48:08.687059Z","published":"2020-08-05T14:15:12.327Z","references":[{"type":"WEB","url":"https://lists.apache.org/thread.html/r6f3a934ebc54585d8468151a494c1919dc1ee2cccaf237ec434dbbd6%40%3Cdev.skywalking.apache.org%3E"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2020/08/05/3"},{"type":"ADVISORY","url":"https://github.com/apache/skywalking/pull/4970"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/skywalking","events":[{"introduced":"0"},{"last_affected":"4d4ca9c5173ea4caad6155e047ace855556f550e"},{"last_affected":"cf6d53c79b9ddb6dfc1cff0d95a2e4dabea9d246"},{"last_affected":"c2e2d4182d5715cce49b6f95670f3fae2f44d0ba"},{"last_affected":"ed6bcb91c2832468fc16945e487a082cae627f88"},{"last_affected":"629040f5abb98110255083a868013a8785c7db05"}],"database_specific":{"cpe":["cpe:2.3:a:apache:skywalking:6.5.0:*:*:*:*:*:*:*","cpe:2.3:a:apache:skywalking:6.6.0:*:*:*:*:*:*:*","cpe:2.3:a:apache:skywalking:7.0.0:*:*:*:*:*:*:*","cpe:2.3:a:apache:skywalking:8.0.0:*:*:*:*:*:*:*","cpe:2.3:a:apache:skywalking:8.0.1:*:*:*:*:*:*:*"],"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"6.5.0"},{"last_affected":"6.6.0"},{"last_affected":"7.0.0"},{"last_affected":"8.0.0"},{"last_affected":"8.0.1"}]}}],"versions":["1.0-alpha1","1.0-alpha2","1.0-beta","v1.0-Final","v2.1-2017","v3.0-2017","v3.0.1-2017","v3.1","v3.1.1","v3.2","v3.2.1","v3.2.2","v3.2.3","v3.2.4","v6.5.0","v6.6.0","v7.0.0","v8.0.0","v8.0.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-13921.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}