The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
References
Configurations
History
21 Nov 2024, 02:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/91802 - Third Party Advisory, VDB Entry | |
References | () https://framework.zend.com/security/advisory/ZF2016-02 - Exploit, Technical Description, Vendor Advisory | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2JUKFTI6ABK7ZN7IEAGPCLAHCFANMID2/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N27AV6AL6B4KGEP3VIMIHQ5LFAKF5FTU/ - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UR5HXNGIUSSIZKMSZYMPBEPZEZTYFTIT/ - | |
References | () https://security.gentoo.org/glsa/201804-10 - |
07 Nov 2023, 02:33
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2017-02-17 02:59
Updated : 2024-11-21 02:55
NVD link : CVE-2016-6233
Mitre link : CVE-2016-6233
CVE.ORG link : CVE-2016-6233
JSON object : View
Products Affected
zend
- zend_framework
fedoraproject
- fedora
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')