Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 25 Mar 2011 11:07:56 +0100
From: Jan Lieskovsky <jlieskov@...hat.com>
To: "Steven M. Christey" <coley@...us.mitre.org>
CC: oss-security <oss-security@...ts.openwall.com>
Subject: CVE Request -- php-doctrine-Doctrine -- SQL injection flaw


Hello Steve, vendors,

   a SQL injection flaw has been reported against Doctrine, the PHP Object Relational Mapper:
   [1] http://www.doctrine-project.org/blog/doctrine-security-fix
   [2] https://bugzilla.redhat.com/show_bug.cgi?id=689396

Further from [1]:
"The security hole was found today and affects the Doctrine\DBAL\Platforms\AbstractPlatform::modifyLimitQuery()
function which does not cast input values for limit and offset to integer and allows malicious SQL to be executed
if these parameters are passed into Doctrine 2 directly from request variables without previous cast to integer."

Could you allocate a CVE id for this?

Thanks && Regards, Jan.
--
Jan iankko Lieskovsky / Red Hat Security Response Team

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.