{"id":"CVE-2020-10184","details":"The verify endpoint in YubiKey Validation Server before 2.40 does not check the length of SQL queries, which allows remote attackers to cause a denial of service, aka SQL injection. NOTE: this issue is potentially relevant to persons outside Yubico who operate a self-hosted OTP validation service; the issue does NOT affect YubiCloud.","modified":"2026-04-10T04:21:27.478395Z","published":"2020-03-05T23:15:13.277Z","references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00014.html"},{"type":"ADVISORY","url":"https://github.com/Yubico/yubikey-val/releases/tag/yubikey-val-2.40"},{"type":"EVIDENCE","url":"https://www.yubico.com/support/security-advisories/ysa-2020-01/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/yubico/yubikey-val","events":[{"introduced":"0"},{"fixed":"19345b76eea90d1cb3996296c12ae616d8151c22"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"2.40"}]}}],"versions":["yubikey-val-2.12","yubikey-val-2.13","yubikey-val-2.16","yubikey-val-2.17","yubikey-val-2.18","yubikey-val-2.19","yubikey-val-2.20","yubikey-val-2.21","yubikey-val-2.22","yubikey-val-2.23","yubikey-val-2.24","yubikey-val-2.25","yubikey-val-2.26","yubikey-val-2.27","yubikey-val-2.28","yubikey-val-2.29","yubikey-val-2.30","yubikey-val-2.31","yubikey-val-2.32","yubikey-val-2.33","yubikey-val-2.34","yubikey-val-2.35","yubikey-val-2.36","yubikey-val-2.37","yubikey-val-2.38","yubikey-val-2.39"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-10184.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}