Skip to content

TYPO3 SQL Injection in dbal

High severity GitHub Reviewed Published Jun 3, 2024 to the GitHub Advisory Database • Updated Jun 3, 2024

Package

composer typo3/cms (Composer)

Affected versions

>= 6.2.0, < 6.2.18

Patched versions

6.2.18

Description

A flaw in the database escaping API results in a SQL injection vulnerability when extension dbal is enabled and configured for MySQL passthrough mode in its extension configuration. All queries which use the DatabaseConnection::sql_query are vulnerable, even if arguments were properly escaped with DatabaseConnection::quoteStr beforehand.

References

Published to the GitHub Advisory Database Jun 3, 2024
Reviewed Jun 3, 2024
Last updated Jun 3, 2024

Severity

High

Weaknesses

No CWEs

CVE ID

No known CVE

GHSA ID

GHSA-9895-53fc-98v2

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.