Search for vulnerabilities
Vulnerability ID | VCID-m57g-8gch-7ydt |
Aliases |
GHSA-9895-53fc-98v2
|
Summary | TYPO3 SQL Injection in dbal A flaw in the database escaping API results in a SQL injection vulnerability when extension dbal is enabled and configured for MySQL passthrough mode in its extension configuration. All queries which use the DatabaseConnection::sql_query are vulnerable, even if arguments were properly escaped with DatabaseConnection::quoteStr beforehand. |
Status | Published |
Exploitability | 0.5 |
Weighted Severity | 8.0 |
Risk | 4.0 |
Affected and Fixed Packages | Package Details |
System | Score | Found at |
---|---|---|
cvssv3.1_qr | HIGH | https://github.com/advisories/GHSA-9895-53fc-98v2 |
generic_textual | HIGH | https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2016-02-16-1.yaml |
generic_textual | HIGH | https://typo3.org/article/typo3-core-sa-2016-001 |
Reference id | Reference type | URL |
---|---|---|
https://github.com/FriendsOfPHP/security-advisories/blob/master/typo3/cms/2016-02-16-1.yaml | ||
https://typo3.org/article/typo3-core-sa-2016-001 | ||
GHSA-9895-53fc-98v2 | https://github.com/advisories/GHSA-9895-53fc-98v2 |
No EPSS data available for this vulnerability.
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
2025-07-01T12:11:06.941737+00:00 | GithubOSV Importer | Import | https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2024/06/GHSA-9895-53fc-98v2/GHSA-9895-53fc-98v2.json | 36.1.3 |