CVE-2021-43608

Doctrine DBAL 3.x before 3.1.4 allows SQL Injection. The escaping of offset and length inputs to the generation of a LIMIT clause was not probably cast to an integer, allowing SQL injection to take place if application developers passed unescaped user input to the DBAL QueryBuilder or any other API that ultimately uses the AbstractPlatform::modifyLimitQuery API.
Configurations

Configuration 1 (hide)

cpe:2.3:a:doctrine-project:database_abstraction_layer:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:29

Type Values Removed Values Added
References () https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d - Patch, Third Party Advisory () https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d - Patch, Third Party Advisory
References () https://github.com/doctrine/dbal/releases - Release Notes, Third Party Advisory () https://github.com/doctrine/dbal/releases - Release Notes, Third Party Advisory
References () https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622 - Third Party Advisory () https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622 - Third Party Advisory
References () https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html - Vendor Advisory () https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html - Vendor Advisory

Information

Published : 2021-12-09 20:15

Updated : 2024-11-21 06:29


NVD link : CVE-2021-43608

Mitre link : CVE-2021-43608

CVE.ORG link : CVE-2021-43608


JSON object : View

Products Affected

doctrine-project

  • database_abstraction_layer
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')