Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6233

Опубликовано: 17 фев. 2017
Источник: debian

Описание

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zendframeworkfixed1.12.19+dfsg-1package
zendframeworknot-affectedjessiepackage
zendframeworknot-affectedwheezypackage

Примечания

  • http://framework.zend.com/security/advisory/ZF2016-02

  • https://github.com/zendframework/zf1/commit/bf3f40605be3d8f136a07ae991079a7dcb34d967

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 9 лет назад

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

CVSS3: 9.8
nvd
почти 9 лет назад

The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.

CVSS3: 9.8
github
больше 3 лет назад

Zend Framework Allows SQL Injection