{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2016-15020","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-01-15T10:19:07.264Z","datePublished":"2023-01-16T10:58:04.994Z","dateUpdated":"2024-08-06T03:47:35.008Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-10-20T10:07:14.878Z"},"title":"liftkit database Query.php processOrderBy sql injection","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-89","lang":"en","description":"CWE-89 SQL Injection"}]}],"affected":[{"vendor":"liftkit","product":"database","versions":[{"version":"2.13.0","status":"affected"},{"version":"2.13.1","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in liftkit database up to 2.13.1. It has been classified as critical. This affects the function processOrderBy of the file src/Query/Query.php. The manipulation leads to sql injection. Upgrading to version 2.13.2 is able to address this issue. The patch is named 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a. It is recommended to upgrade the affected component. The associated identifier of this vulnerability is VDB-218391."},{"lang":"de","value":"Es wurde eine Schwachstelle in liftkit database bis 2.13.1 ausgemacht. Sie wurde als kritisch eingestuft. Hiervon betroffen ist die Funktion processOrderBy der Datei src/Query/Query.php. Durch Manipulieren mit unbekannten Daten kann eine sql injection-Schwachstelle ausgenutzt werden. Ein Aktualisieren auf die Version 2.13.2 vermag dieses Problem zu lösen. Der Patch wird als 42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a bezeichnet. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":5.5,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":5.5,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":5.2,"vectorString":"AV:A/AC:L/Au:S/C:P/I:P/A:P"}}],"timeline":[{"time":"2023-01-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-01-15T00:00:00.000Z","lang":"en","value":"CVE reserved"},{"time":"2023-01-15T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-02-07T17:52:39.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB GitHub Commit Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.218391","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.218391","tags":["signature","permissions-required"]},{"url":"https://github.com/liftkit/database/commit/42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a","tags":["patch"]},{"url":"https://github.com/liftkit/database/releases/tag/v2.13.2","tags":["patch"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-07-18T17:21:32.228586Z","id":"CVE-2016-15020","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-18T17:21:39.340Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-06T03:47:35.008Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.218391","tags":["vdb-entry","technical-description","x_transferred"]},{"url":"https://vuldb.com/?ctiid.218391","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/liftkit/database/commit/42ec8f2b22e0b0b98fb5b4444ed451c1b21d125a","tags":["patch","x_transferred"]},{"url":"https://github.com/liftkit/database/releases/tag/v2.13.2","tags":["patch","x_transferred"]}]}]}}