The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UR5HXNGIUSSIZKMSZYMPBEPZEZTYFTIT/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N27AV6AL6B4KGEP3VIMIHQ5LFAKF5FTU/ | Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2JUKFTI6ABK7ZN7IEAGPCLAHCFANMID2/ | Third Party Advisory |
https://framework.zend.com/security/advisory/ZF2016-02 | Exploit Technical Description Vendor Advisory |
http://www.securityfocus.com/bid/91802 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201804-10 |
Information
Published : 2017-02-16 18:59
Updated : 2018-10-21 03:29
NVD link : CVE-2016-6233
Mitre link : CVE-2016-6233
JSON object : View
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Products Affected
zend
- zend_framework
fedoraproject
- fedora