mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
106 lines
4.2 KiB
JSON
106 lines
4.2 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2022-24752",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "SQL Injection through sorting parameters in SyliusGridBundle"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "SyliusGridBundle",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "< 1.10.1"
|
|
},
|
|
{
|
|
"version_value": "1.11-alpha, <= 1.11-rc"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Sylius"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "SyliusGridBundle is a package of generic data grids for Symfony applications. Prior to versions 1.10.1 and 1.11-rc2, values added at the end of query sorting were passed directly to the database. The maintainers do not know if this could lead to direct SQL injections but took steps to remediate the vulnerability. The issue is fixed in versions 1.10.1 and 1.11-rc2. As a workaround, overwrite the`Sylius\\Component\\Grid\\Sorting\\Sorter.php` class and register it in the container. More information about this workaround is available in the GitHub Security Advisory."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "HIGH",
|
|
"baseScore": 9.8,
|
|
"baseSeverity": "CRITICAL",
|
|
"confidentialityImpact": "HIGH",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "NONE",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439"
|
|
},
|
|
{
|
|
"name": "https://github.com/Sylius/SyliusGridBundle/pull/222",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/Sylius/SyliusGridBundle/pull/222"
|
|
},
|
|
{
|
|
"name": "https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784"
|
|
},
|
|
{
|
|
"name": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1"
|
|
},
|
|
{
|
|
"name": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-2xmm-g482-4439",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |