Headline
GHSA-6g8q-qfpv-57wp: CakePHP vulnerable to SQL injection
Impact
The Cake\Database\Query::limit()
and Cake\Database\Query::offset()
methods are vulnerable to SQL injection if passed un-sanitized user request data.
Patches
This issue has been fixed in 4.2.12, 4.3.11, 4.4.10
Workarounds
Using CakePHP’s Pagination library will mitigate this issue, as will validating or casting parameters to these methods.
References
https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html
Package
composer cakephp/cakephp (Composer)
Affected versions
>= 4.2.0, < 4.2.12
>= 4.3.0, < 4.3.11
>= 4.4.0, < 4.4.10
Patched versions
4.2.12
4.3.11
4.4.10
Description
Impact
The Cake\Database\Query::limit() and Cake\Database\Query::offset() methods are vulnerable to SQL injection if passed un-sanitized user request data.
Patches
This issue has been fixed in 4.2.12, 4.3.11, 4.4.10
Workarounds
Using CakePHP’s Pagination library will mitigate this issue, as will validating or casting parameters to these methods.
References
https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html
References
- GHSA-6g8q-qfpv-57wp
- https://nvd.nist.gov/vuln/detail/CVE-2023-22727
- cakephp/cakephp@3f463e7
- https://bakery.cakephp.org/2023/01/06/cakephp_4211_4311_4410_released.html
markstory published the maintainer security advisory
Jan 17, 2023
Related news
CakePHP is a development framework for PHP web apps. In affected versions the `Cake\Database\Query::limit()` and `Cake\Database\Query::offset()` methods are vulnerable to SQL injection if passed un-sanitized user request data. This issue has been fixed in 4.2.12, 4.3.11, 4.4.10. Users are advised to upgrade. Users unable to upgrade may mitigate this issue by using CakePHP's Pagination library. Manually validating or casting parameters to these methods will also mitigate the issue.