GHSA-ww43-mcvh-35p4

Suggest an improvement
Source
https://github.com/advisories/GHSA-ww43-mcvh-35p4
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2023/01/GHSA-ww43-mcvh-35p4/GHSA-ww43-mcvh-35p4.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-ww43-mcvh-35p4
Aliases
  • CVE-2014-125029
Published
2023-01-08T00:30:15Z
Modified
2023-11-08T03:57:34.204283Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
PaginationServiceProvider SQL Injection vulnerability
Details

A vulnerability was found in ttskch PaginationServiceProvider up to 0.x. It has been declared as critical. This vulnerability affects unknown code of the file demo/index.php of the component demo. The manipulation of the argument sort/id leads to sql injection. Upgrading to version 1.0.0 can address this issue. The name of the patch is 619de478efce17ece1a3b913ab16e40651e1ea7b. It is recommended to upgrade the affected component. VDB-217150 is the identifier assigned to this vulnerability.

Database specific
{
    "nvd_published_at": "2023-01-07T22:15:00Z",
    "cwe_ids": [
        "CWE-89"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2023-01-12T23:43:48Z"
}
References

Affected packages

Packagist / ttskch/pagination-service-provider

Package

Name
ttskch/pagination-service-provider
Purl
pkg:composer/ttskch/pagination-service-provider

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.0.0