Description
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4721 | The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression. |
Github GHSA |
GHSA-p9hp-3gpv-52w3 | Zend Framework Allows SQL Injection |
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T01:22:20.678Z
Reserved: 2016-07-16T00:00:00.000Z
Link: CVE-2016-6233
No data.
Status : Modified
Published: 2017-02-17T02:59:13.500
Modified: 2026-05-13T00:24:29.033
Link: CVE-2016-6233
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA