-
CVSS Score
-The vulnerability stems from missing null byte filtering in SQL query parameter handling. The Zend security advisory explicitly mentions the fix was applied to Zend_Db_Adapter_Pdo_Abstract using addcslashes to escape null bytes (\000). The commit 2ac9c30f73ec2e6235c602bed745749a551b4fe2 shows the vulnerable quote() method was modified in Abstract.php to add this filtering. Since all PDO adapters inherit from this abstract class, the quote() method was the common vulnerable entry point.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| zendframework/zendframework1 | composer | < 1.12.16 | 1.12.16 |
A Semantic Attack on Google Gemini - Read the Latest Research