icon

We found results for “

WS-2018-0059

Good to know:

icon

Date: February 16, 2016

SQL Injection in TYPO3 6.2.x before 6.2.18. A flaw in the database escaping API results in a SQL injection vulnerability when extension dbal is enabled and configured for MySQL passthrough mode in its extension configuration. All queries which use the DatabaseConnection::sql_query are vulnerable, even if arguments were properly escaped with DatabaseConnection::quoteStr beforehand.

Language: PHP

Severity Score

Severity Score

Weakness Type (CWE)

Configuration

CWE-16

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

CWE-74

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

CWE-89

Top Fix

icon

Upgrade Version

Upgrade to version typo3/cms - dev-TYPO3_6-2;typo3/cms - 6.2.2;typo3/cms - 6.2.16;typo3/cms - 6.2.10-rc1;typo3/cms - 6.2.8;typo3/cms - 6.2.13;typo3/cms - TYPO3_6-2-18

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): LOW
Availability (A): LOW

Do you need more information?

Contact Us