CVE-2019-10766:
SQL Injection in usmanhalalit/pixie
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.55005%
CWE
Published
11/20/2019
Updated
1/9/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
usmanhalalit/pixie | composer | < 1.0.3 | 1.0.3 |
usmanhalalit/pixie | composer | >= 2.0.0, < 2.0.2 | 2.0.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from improper sanitization in the limit()
method's parameter handling. The commit diff shows explicit (int) casting was added to $statements['limit'] and $statements['offset'] in BaseAdapter.php
's select method to fix SQL injection. Before patching, non-integer values (like SQL expressions) passed to limit()
were directly embedded in SQL queries. The Snyk PoC demonstrates exploiting this by passing a subquery string to limit()
.