GHSA-9895-53fc-98v2

Suggest an improvement
Source
https://github.com/advisories/GHSA-9895-53fc-98v2
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-9895-53fc-98v2/GHSA-9895-53fc-98v2.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-9895-53fc-98v2
Published
2024-06-03T16:46:05Z
Modified
2024-11-29T05:46:27.087772Z
Summary
TYPO3 SQL Injection in dbal
Details

A flaw in the database escaping API results in a SQL injection vulnerability when extension dbal is enabled and configured for MySQL passthrough mode in its extension configuration. All queries which use the DatabaseConnection::sql_query are vulnerable, even if arguments were properly escaped with DatabaseConnection::quoteStr beforehand.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-06-03T16:46:05Z"
}
References

Affected packages

Packagist / typo3/cms

Package

Name
typo3/cms
Purl
pkg:composer/typo3/cms

Affected ranges

Type
ECOSYSTEM
Events
Introduced
6.2.0
Fixed
6.2.18

Affected versions

6.*

6.2.0
6.2.1
6.2.2
6.2.3
6.2.4
6.2.5
6.2.6
6.2.7
6.2.8
6.2.9
6.2.10-rc1
6.2.10
6.2.11
6.2.12
6.2.13
6.2.14
6.2.15
6.2.16
6.2.17