Описание
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
Ссылки
- Third Party AdvisoryVDB Entry
- ExploitTechnical DescriptionVendor Advisory
- Third Party AdvisoryVDB Entry
- ExploitTechnical DescriptionVendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:o:fedoraproject:fedora:23:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:24:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:25:*:*:*:*:*:*:*
Конфигурация 2Версия до 1.12.19 (включая)
cpe:2.3:a:zend:zend_framework:*:*:*:*:*:*:*:*
EPSS
Процентиль: 82%
0.01724
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89
Связанные уязвимости
CVSS3: 9.8
ubuntu
почти 9 лет назад
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
CVSS3: 9.8
debian
почти 9 лет назад
The (1) order and (2) group methods in Zend_Db_Select in the Zend Fram ...
EPSS
Процентиль: 82%
0.01724
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
CWE-89