← Retour aux CVEs
CVE-2021-43608
CRITICAL9.8
Description
Doctrine DBAL 3.x before 3.1.4 allows SQL Injection. The escaping of offset and length inputs to the generation of a LIMIT clause was not probably cast to an integer, allowing SQL injection to take place if application developers passed unescaped user input to the DBAL QueryBuilder or any other API that ultimately uses the AbstractPlatform::modifyLimitQuery API.
Details CVE
Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie12/9/2021
Derniere modification11/21/2024
Sourcenvd
Observations honeypot0
Produits affectes
doctrine-project:database_abstraction_layer
Faiblesses (CWE)
CWE-89
References
https://github.com/doctrine/dbal/releases(cve@mitre.org)
https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/doctrine/dbal/releases(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622(af854a3a-2127-422b-91ae-364da2661108)
https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html(af854a3a-2127-422b-91ae-364da2661108)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.