First published: Tue Sep 16 2014(Updated: )
SQL injection vector when manually quoting values for sqlsrv extension, using null byte
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/zendframework/zendframework | >=2.0.0<2.0.99>=2.1.0<2.1.99>=2.2.0<2.2.8>=2.3.0<2.3.3 | |
composer/zendframework/zend-db | >=2.0.0<2.0.99>=2.1.0<2.1.99>=2.2.0<2.2.8>=2.3.0<2.3.3 | |
composer/zendframework/zendframework1 | >=1.12.0<1.12.9 | |
debian/zendframework | ||
composer/zendframework/zendframework | >=2.3.0<2.3.3 | 2.3.3 |
composer/zendframework/zendframework | >=2.2.0<2.2.8 | 2.2.8 |
composer/zendframework/zendframework | >=2.1.0<2.1.99 | 2.1.99 |
composer/zendframework/zendframework | >=2.0.0<2.0.99 | 2.0.99 |
composer/zendframework/zend-db | >=2.3.0<2.3.3 | 2.3.3 |
composer/zendframework/zend-db | >=2.2.0<2.2.8 | 2.2.8 |
composer/zendframework/zend-db | >=2.1.0<2.1.99 | 2.1.99 |
composer/zendframework/zend-db | >=2.0.0<2.0.99 | 2.0.99 |
composer/zendframework/zendframework1 | >=1.12.0<1.12.9 | 1.12.9 |
redhat/Zend Framework | <1.12.9 | 1.12.9 |
redhat/Zend Framework | <2.2.8 | 2.2.8 |
redhat/Zend Framework | <2.3.3 | 2.3.3 |
Zend Framework | <1.12.9 | |
Zend Framework | >=2.2.0<2.2.8 | |
Zend Framework | >=2.3.0<2.3.3 | |
Red Hat Enterprise Linux | =6.0 | |
Red Hat Enterprise Linux | =7.0 | |
Fedora | =19 | |
Fedora | =20 | |
Fedora | =21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8089 is categorized as a critical vulnerability due to its potential to allow remote attackers to execute arbitrary SQL commands.
To fix CVE-2014-8089, upgrade to Zend Framework versions 2.3.3, 2.2.8, 2.1.99, or 2.0.99, or to Zend Framework 1.12.9.
CVE-2014-8089 affects Zend Framework versions prior to 1.12.9, 2.2.8, 2.3.3, as well as specific versions of zend-db and zendframework1.
CVE-2014-8089 is an SQL injection vulnerability that arises when using the sqlsrv PHP extension in the Zend Framework.
Yes, CVE-2014-8089 can be exploited remotely by attackers to gain unauthorized access to databases.