The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.20 might allow remote attackers to conduct SQL injection attacks by leveraging failure to remove comments from an SQL statement before validation.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UR5HXNGIUSSIZKMSZYMPBEPZEZTYFTIT/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N27AV6AL6B4KGEP3VIMIHQ5LFAKF5FTU/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2JUKFTI6ABK7ZN7IEAGPCLAHCFANMID2/ | Third Party Advisory |
https://framework.zend.com/security/advisory/ZF2016-03 | Exploit Technical Description Vendor Advisory |
http://jvndb.jvn.jp/jvndb/JVNDB-2016-000158 | Third Party Advisory VDB Entry |
http://jvn.jp/en/jp/JVN18926672/index.html | Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2018/06/msg00012.html | |
https://security.gentoo.org/glsa/201804-10 |
Information
Published : 2017-02-16 18:59
Updated : 2018-10-21 03:29
NVD link : CVE-2016-4861
Mitre link : CVE-2016-4861
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
zend
- zend_framework
fedoraproject
- fedora