CVE-2021-43822 – jackalope/jackalope-doctrine-dbal
Package
Manager: composer
Name: jackalope/jackalope-doctrine-dbal
Vulnerable Version: >=0 <1.7.4
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.00241 pctl0.47343
Details
SQL injection in jackalope/jackalope-doctrine-dbal ### Impact Users can provoke SQL injections if they can specify a node name or query. ### Patches Upgrade to version 1.7.4 If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. ### Workarounds Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected. ### References No further references. ### For more information If you have any questions or comments about this advisory: * Open an issue in [jackalope/jackalope-doctrine-dbal repo](https://github.com/jackalope/jackalope-doctrine-dbal/issues)
Metadata
Created: 2021-12-14T21:08:13Z
Modified: 2021-12-14T15:25:41Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/12/GHSA-ph98-v78f-jqrm/GHSA-ph98-v78f-jqrm.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-ph98-v78f-jqrm
Finding: F106
Auto approve: 1