The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-4721 | The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework before 1.12.19 might allow remote attackers to conduct SQL injection attacks via vectors related to use of the character pattern [\w]* in a regular expression. |
Github GHSA |
GHSA-p9hp-3gpv-52w3 | Zend Framework Allows SQL Injection |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: debian
Published:
Updated: 2024-08-06T01:22:20.678Z
Reserved: 2016-07-16T00:00:00
Link: CVE-2016-6233
No data.
Status : Deferred
Published: 2017-02-17T02:59:13.500
Modified: 2025-04-20T01:37:25.860
Link: CVE-2016-6233
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA