First published: Thu Nov 11 2021(Updated: )
Doctrine DBAL 3.x before 3.1.4 allows SQL Injection. The escaping of offset and length inputs to the generation of a LIMIT clause was not probably cast to an integer, allowing SQL injection to take place if application developers passed unescaped user input to the DBAL QueryBuilder or any other API that ultimately uses the AbstractPlatform::modifyLimitQuery API.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/doctrine/dbal | >=3.0.0<3.0.99>=3.1.0<3.1.4 | |
Doctrine-project Database Abstraction Layer | >=3.0.0<3.1.4 | |
composer/doctrine/dbal | >=3.0.0<3.1.4 | 3.1.4 |
>=3.0.0<3.1.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43608 has a high severity due to the potential for SQL Injection, which can lead to unauthorized access to the database.
To fix CVE-2021-43608, upgrade the Doctrine DBAL to version 3.1.4 or later.
CVE-2021-43608 affects Doctrine DBAL versions from 3.0.0 up to, but not including, 3.1.4.
CVE-2021-43608 is classified as an SQL Injection vulnerability.
CVE-2021-43608 can be exploited when unescaped user input is passed to the DBAL QueryBuilder, allowing attackers to manipulate SQL queries.