Miggo Logo

GHSA-9895-53fc-98v2:
TYPO3 SQL Injection in dbal

N/A

CVSS Score

Basic Information

CVE ID
-
EPSS Score
-
CWE
-
Published
6/3/2024
Updated
6/3/2024
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
-
Package NameEcosystemVulnerable VersionsFirst Patched Version
typo3/cmscomposer>= 6.2.0, < 6.2.186.2.18

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The advisory explicitly states sql_query remains vulnerable despite proper quoteStr usage. The vulnerability manifests in MySQL passthrough configuration where DBAL's escaping is bypassed. As the primary query execution method, sql_query would appear in stack traces when malicious SQL is executed. No actual patch diff is available, but TYPO3's security bulletin directly implicates this function as the vulnerable entry point.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* *l*w in t** **t***s* *s**pin* *PI r*sults in * SQL inj**tion vuln*r**ility w**n *xt*nsion ***l is *n**l** *n* *on*i*ur** *or MySQL p*sst*rou** mo** in its *xt*nsion *on*i*ur*tion. *ll qu*ri*s w*i** us* t** **t***s**onn**tion::sql_qu*ry *r* vuln*r**

Reasoning

T** **visory *xpli*itly st*t*s sql_qu*ry r*m*ins vuln*r**l* **spit* prop*r quot*Str us***. T** vuln*r**ility m*ni**sts in MySQL p*sst*rou** *on*i*ur*tion w**r* ***L's *s**pin* is *yp*ss**. *s t** prim*ry qu*ry *x**ution m*t*o*, sql_qu*ry woul* *pp**r