CVE-2021-43608

Doctrine DBAL 3.x before 3.1.4 allows SQL Injection. The escaping of offset and length inputs to the generation of a LIMIT clause was not probably cast to an integer, allowing SQL injection to take place if application developers passed unescaped user input to the DBAL QueryBuilder or any other API that ultimately uses the AbstractPlatform::modifyLimitQuery API.
Configurations

Configuration 1 (hide)

cpe:2.3:a:doctrine-project:database_abstraction_layer:*:*:*:*:*:*:*:*

History

15 Dec 2021, 14:46

Type Values Removed Values Added
References (MISC) https://github.com/doctrine/dbal/releases - (MISC) https://github.com/doctrine/dbal/releases - Release Notes, Third Party Advisory
References (MISC) https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html - (MISC) https://www.doctrine-project.org/2021/11/11/dbal3-vulnerability-fixed.html - Vendor Advisory
References (MISC) https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d - (MISC) https://github.com/doctrine/dbal/commit/9dcfa4cb6c03250b78a84737ba7ceb82f4b7ba4d - Patch, Third Party Advisory
References (CONFIRM) https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622 - (CONFIRM) https://github.com/doctrine/dbal/security/advisories/GHSA-r7cj-8hjg-x622 - Third Party Advisory
CPE cpe:2.3:a:doctrine-project:database_abstraction_layer:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-89

09 Dec 2021, 20:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-12-09 20:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-43608

Mitre link : CVE-2021-43608

CVE.ORG link : CVE-2021-43608


JSON object : View

Products Affected

doctrine-project

  • database_abstraction_layer
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')