← Back to CVEs
CVE-2021-43608
CRITICAL9.8
Description
Doctrine DBAL 3.x before 3.1.4 allows SQL Injection. The escaping of offset and length inputs to the generation of a LIMIT clause was not probably cast to an integer, allowing SQL injection to take place if application developers passed unescaped user input to the DBAL QueryBuilder or any other API that ultimately uses the AbstractPlatform::modifyLimitQuery API.
CVE Details
CVSS v3.1 Score9.8
SeverityCRITICAL
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published12/9/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
doctrine-project:database_abstraction_layer
Weaknesses (CWE)
CWE-89
References
https://github.com/doctrine/dbal/releases(cve@mitre.org)
https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/doctrine/dbal/releases(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622(af854a3a-2127-422b-91ae-364da2661108)
https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.