Advisory Database
  • Advisories
  • Dependency Scanning
  1. composer
  2. ›
  3. silverstripe/framework
  4. ›
  5. GHSA-xx4r-5265-48j6

GHSA-xx4r-5265-48j6: silverstripe/framework SQL injection in full text search

May 27, 2024

When performing a fulltext search in SilverStripe 4.0.0 the ‘start’ querystring parameter is never escaped safely. This exposes a possible SQL injection vulnerability.

The issue exists in 3.5 and 3.6 but is less vulnerable, as SearchForm sanitises these variables prior to passing to mysql.

References

  • github.com/FriendsOfPHP/security-advisories/blob/master/silverstripe/framework/SS-2017-008-1.yaml
  • github.com/advisories/GHSA-xx4r-5265-48j6
  • github.com/silverstripe/silverstripe-framework
  • github.com/silverstripe/silverstripe-framework/commit/099a5a3c2d99ed39bdd8815e1e2790bb9351770b
  • github.com/silverstripe/silverstripe-framework/commit/a8465900bdc77199176c953890ce7587045b1ea4
  • www.silverstripe.org/download/security-releases/ss-2017-008

Code Behaviors & Features

Detect and mitigate GHSA-xx4r-5265-48j6 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.5.0-rc1 before 3.5.6, all versions starting from 3.6.0-rc1 before 3.6.3, all versions starting from 4.0.0-rc1 before 4.0.1

Fixed versions

  • 3.5.6
  • 3.6.3
  • 4.0.1

Solution

Upgrade to versions 3.5.6, 3.6.3, 4.0.1 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Source file

packagist/silverstripe/framework/GHSA-xx4r-5265-48j6.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:14:51 +0000.