Description
A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The patch is named 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218391.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-0409 | A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The patch is named 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218391. |
Github GHSA |
GHSA-8hcf-2m4v-f2rq | SQL Injection in liftkit/database |
References
History
No history.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2024-08-06T03:47:35.008Z
Reserved: 2023-01-15T10:19:07.264Z
Link: CVE-2016-15020
Updated: 2024-08-06T03:47:35.008Z
Status : Modified
Published: 2023-01-16T11:15:10.147
Modified: 2024-11-21T02:45:30.650
Link: CVE-2016-15020
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA