{"id":"CVE-2023-42284","details":"Blind SQL injection in api_version parameter in Tyk Gateway version 5.0.3 allows attacker to access and dump the database via a crafted SQL query.","modified":"2026-04-12T07:19:43.106699Z","published":"2023-11-07T08:15:12.577Z","references":[{"type":"EVIDENCE","url":"https://github.com/andreysanyuk/CVE-2023-42284"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/tyktechnologies/tyk","events":[{"introduced":"0"},{"last_affected":"54e1072a6a9918e29606edf6b60def437b273d0a"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"5.0.3"}],"cpe":"cpe:2.3:a:tyk:tyk:5.0.3:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["1.0","1.1","1.2","1.3","1.3.0.1","1.4","1.5","1.6","1.7","1.7.1","2.7","v1.2.1","v1.8","v1.8.1","v1.8.2","v1.8.3","v1.8.3.1","v1.8.3.2","v1.9","v1.9.1","v2.2","v2.2.0.4","v2.5.0","v2.6.0","v2.9","v2.9.1","v3.0.8-rc4","v4.3.0-rc2","v5.0.0-alpha2","v5.0.0-rc40","v5.0.3","v5.0.3-rc1","v5.0.3-rc10","v5.0.3-rc11","v5.0.3-rc12","v5.0.3-rc4","v5.0.3-rc5","v5.0.3-rc6","v5.0.3-rc9","v5.3.0-rc4"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-42284.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}