SQL Injection in dbal

2016-02-16T00:00:00
ID TYPO3-CORE-SA-2016-001
Type typo3
Reporter TYPO3 Association
Modified 2016-02-16T00:00:00

Description

It has been discovered, that TYPO3 is susceptible to SQL Injection

Component Type: TYPO3 CMS

Release Date: February 16, 2016

Vulnerable subcomponent: Dbal

Vulnerability Type: SQL Injection

Affected Versions: Versions 6.2.0 to 6.2.17

Severity: High

Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:C/I:P/A:N/E:F/RL:O/RC:C

CVE: not assigned yet

Problem Description: A flaw in the database escaping API results in a SQL injection vulnerability when extension dbal is enabled and configured for MySQL passthrough mode in its extension configuration. All queries which use the DatabaseConnection::sql_query are vulnerable, even if arguments were properly escaped with DatabaseConnection::quoteStr beforehand.

Solution: Update to TYPO3 versions 6.2.18 that fix the problem described.

Credits: Thanks to Mohamed Rebai who discovered and reported the issue.

General Advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list.

General Note: All security related code changes are tagged so that you can easily look them up on our review system.