CVE-2021-44427: SQL Injection in rosariosis
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99297%
CWE
Published
12/2/2021
Updated
2/1/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
francoisjacquet/rosariosis | composer | < 8.1.1 | 8.1.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from unsanitized 'syear' parameter handling in Side.php
, which flows through UserSyear()
to GetCurrentMP()
. The patch moved AJAX handling to a sanitized $_REQUEST
approach, but prior to 8.1.1, GetCurrentMP()
in GetMP.php
directly incorporated user-controlled 'syear' into SQL queries via UserSyear()
from Current.php
. The GitLab issue #328 analysis confirms this injection occurs in the SQL query at GetMP.php
lines 411-416 using UserSyear()
, which was populated from unauthenticated user input.