CVE-2021-43822 – SQL injection in jackalope/jackalope-doctrine-dbal
https://notcve.org/view.php?id=CVE-2021-43822
Jackalope Doctrine-DBAL is an implementation of the PHP Content Repository API (PHPCR) using a relational database to persist data. In affected versions users can provoke SQL injections if they can specify a node name or query. Upgrade to version 1.7.4 to resolve this issue. If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. Node names and xpaths can contain `"` or `;` according to the JCR specification. • https://github.com/jackalope/jackalope-doctrine-dbal/commit/9d179a36d320330ddb303ea3a7c98d3a33d231db https://github.com/jackalope/jackalope-doctrine-dbal/security/advisories/GHSA-ph98-v78f-jqrm • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2015-5723
https://notcve.org/view.php?id=CVE-2015-5723
Doctrine Annotations before 1.2.7, Cache before 1.3.2 and 1.4.x before 1.4.2, Common before 2.4.3 and 2.5.x before 2.5.1, ORM before 2.4.8 or 2.5.x before 2.5.1, MongoDB ODM before 1.0.2, and MongoDB ODM Bundle before 3.0.1 use world-writable permissions for cache directories, which allows local users to execute arbitrary PHP code with additional privileges by leveraging an application with the umask set to 0 and that executes cache entries as code. Doctrine Annotations en versiones anteriores a 1.2.7, Cache en versiones anteriores a 1.3.2 y 1.4.x en versiones anteriores a 1.4.2, Common en versiones anteriores a 2.4.3 y 2.5.x en versiones anteriores a 2.5.1, ORM en versiones anteriores 2.4.8 o 2.5.x en versiones anteriores 2.5.1, MongoDB ODM en versiones anteriores a 1.0.2 y MongoDB ODM Bundle en versiones anteriores a 3.0.1 utilizan permisos de escritura universal para directorios de caché, lo que permite a usuarios locales ejecutar código PHP arbitrario con privilegios adicionales aprovechando una aplicación con el umask establecido a 0 y que ejecuta entradas de caché como código. • http://framework.zend.com/security/advisory/ZF2015-07 http://www.debian.org/security/2015/dsa-3369 http://www.doctrine-project.org/2015/08/31/security_misconfiguration_vulnerability_in_various_doctrine_projects.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2IUUC7HPN4XE5NNTG4MR76OC662XRZUO https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HPS7A54FQ2CR6PH4NDR6UIYJIRNFXW67 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2011-1522
https://notcve.org/view.php?id=CVE-2011-1522
Multiple SQL injection vulnerabilities in the Doctrine\DBAL\Platforms\AbstractPlatform::modifyLimitQuery function in Doctrine 1.x before 1.2.4 and 2.x before 2.0.3 allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset field. Múltiples vulnerabilidades de inyección SQL en Doctrine\DBAL\Platforms\AbstractPlatform en la función modifyLimitQuery en Doctrine v1.x antes de v1.2.4 y v2.x antes de v2.0.3 permiten a atacantes remotos ejecutar comandos SQL a través de los campos(1) limit o (2) offset. • http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=622674 http://openwall.com/lists/oss-security/2011/03/25/2 http://openwall.com/lists/oss-security/2011/03/28/3 http://www.debian.org/security/2011/dsa-2223 http://www.doctrine-project.org/blog/doctrine-security-fix http://www.securityfocus.com/bid/47034 https://bugzilla.redhat.com/show_bug.cgi?id=689396 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •