Vulnerability Details CVE-2021-43822
Jackalope Doctrine-DBAL is an implementation of the PHP Content Repository API (PHPCR) using a relational database to persist data. In affected versions users can provoke SQL injections if they can specify a node name or query. Upgrade to version 1.7.4 to resolve this issue. If that is not possible, you can escape all places where `$property` is used to filter `sv:name` in the class `Jackalope\Transport\DoctrineDBAL\Query\QOMWalker`: `XPath::escape($property)`. Node names and xpaths can contain `"` or `;` according to the JCR specification. The jackalope component that translates the query object model into doctrine dbal queries does not properly escape the names and paths, so that a accordingly crafted node name can lead to an SQL injection. If queries are never done from user input, or if you validate the user input to not contain `;`, you are not affected.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 47.6%
CVSS Severity
CVSS v3 Score 8.5
CVSS v2 Score 6.8
Products affected by CVE-2021-43822
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.0.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.1.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.1.1
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.1.2
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.1.3
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.1.4
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.1.5
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.1
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.2
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.3
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.4
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.5
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.6
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.7
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.2.8
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.3.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.3.1
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.3.2
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.3.3
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.3.4
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.3.5
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.3.6
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.4.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.4.1
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.5.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.5.1
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.6.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.6.1
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.7.0
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.7.1
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.7.2
-
cpe:2.3:a:jackalope_doctrine-dbal_project:jackalope_doctrine-dbal:1.7.3