GHSA-6fqw-j3vm-7f66: Zendframework1 Potential SQL injection in ORDER and GROUP functions
9.8
CVSS Score
3.1
Basic Information
CVE ID
-
GHSA ID
EPSS Score
-
CWE
Published
6/7/2024
Updated
6/7/2024
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| zendframework/zendframework1 | composer | < 1.12.20 | 1.12.20 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The advisory explicitly demonstrates vulnerability through the order() method and states 'same with group()'. Both methods process user input for SQL clauses without adequate comment stripping and input validation. The core issue resides in Zend_Db_Select's handling of ORDER/GROUP parameters, where comments can bypass security checks. The patch specifically targets these methods by adding comment removal before validation.