CVE-2016-6233

Priority
Description
The (1) order and (2) group methods in Zend_Db_Select in the Zend Framework
before 1.12.19 might allow remote attackers to conduct SQL injection
attacks via vectors related to use of the character pattern [\w]* in a
regular expression.
Notes
Package
Upstream:released (1.12.19)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (code not present)
Ubuntu 19.10 (Eoan Ermine):DNE
Ubuntu 20.04 (Focal Fossa):DNE
Patches:
Upstream:https://github.com/zendframework/zf1/commit/bf3f40605be3d8f136a07ae991079a7dcb34d967
More Information

Updated: 2020-04-24 03:32:47 UTC (commit d3f8a6ed481830fb100109a132bef581fc4176fe)