Miggo Logo

GHSA-6fqw-j3vm-7f66: Zendframework1 Potential SQL injection in ORDER and GROUP functions

9.8

CVSS Score
3.1

Basic Information

CVE ID
-
EPSS Score
-
Published
6/7/2024
Updated
6/7/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
zendframework/zendframework1composer< 1.12.201.12.20

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly demonstrates vulnerability through the order() method and states 'same with group()'. Both methods process user input for SQL clauses without adequate comment stripping and input validation. The core issue resides in Zend_Db_Select's handling of ORDER/GROUP parameters, where comments can bypass security checks. The patch specifically targets these methods by adding comment removal before validation.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** impl*m*nt*tion o* OR**R *Y *n* *ROUP *Y in Z*n*_**_S*l**t r*m*in** pron* to SQL inj**tion w**n * *om*in*tion o* SQL *xpr*ssions *n* *omm*nts w*r* us**. T*is s**urity p*t** provi**s * *ompr***nsiv* solution t**t i**nti*i*s *n* r*mov*s *omm*nts pri

Reasoning

T** **visory *xpli*itly **monstr*t*s vuln*r**ility t*rou** t** or**r() m*t*o* *n* st*t*s 's*m* wit* *roup()'. *ot* m*t*o*s pro**ss us*r input *or SQL *l*us*s wit*out ***qu*t* *omm*nt strippin* *n* input v*li**tion. T** *or* issu* r*si**s in Z*n*_**_S