Show plain JSON{"containers": {"cna": {"affected": [{"product": "SyliusGridBundle", "vendor": "Sylius", "versions": [{"status": "affected", "version": "< 1.10.1"}, {"status": "affected", "version": "1.11-alpha, <= 1.11-rc"}]}], "descriptions": [{"lang": "en", "value": "SyliusGridBundle is a package of generic data grids for Symfony applications. Prior to versions 1.10.1 and 1.11-rc2, values added at the end of query sorting were passed directly to the database. The maintainers do not know if this could lead to direct SQL injections but took steps to remediate the vulnerability. The issue is fixed in versions 1.10.1 and 1.11-rc2. As a workaround, overwrite the`Sylius\\Component\\Grid\\Sorting\\Sorter.php` class and register it in the container. More information about this workaround is available in the GitHub Security Advisory."}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-89", "description": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-03-15T14:40:13.000Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/Sylius/SyliusGridBundle/pull/222"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1"}, {"tags": ["x_refsource_MISC"], "url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2"}], "source": {"advisory": "GHSA-2xmm-g482-4439", "discovery": "UNKNOWN"}, "title": "SQL Injection through sorting parameters in SyliusGridBundle", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "security-advisories@github.com", "ID": "CVE-2022-24752", "STATE": "PUBLIC", "TITLE": "SQL Injection through sorting parameters in SyliusGridBundle"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "SyliusGridBundle", "version": {"version_data": [{"version_value": "< 1.10.1"}, {"version_value": "1.11-alpha, <= 1.11-rc"}]}}]}, "vendor_name": "Sylius"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "SyliusGridBundle is a package of generic data grids for Symfony applications. Prior to versions 1.10.1 and 1.11-rc2, values added at the end of query sorting were passed directly to the database. The maintainers do not know if this could lead to direct SQL injections but took steps to remediate the vulnerability. The issue is fixed in versions 1.10.1 and 1.11-rc2. As a workaround, overwrite the`Sylius\\Component\\Grid\\Sorting\\Sorter.php` class and register it in the container. More information about this workaround is available in the GitHub Security Advisory."}]}, "impact": {"cvss": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')"}]}]}, "references": {"reference_data": [{"name": "https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439", "refsource": "CONFIRM", "url": "https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439"}, {"name": "https://github.com/Sylius/SyliusGridBundle/pull/222", "refsource": "MISC", "url": "https://github.com/Sylius/SyliusGridBundle/pull/222"}, {"name": "https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784", "refsource": "MISC", "url": "https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784"}, {"name": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1", "refsource": "MISC", "url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1"}, {"name": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2", "refsource": "MISC", "url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2"}]}, "source": {"advisory": "GHSA-2xmm-g482-4439", "discovery": "UNKNOWN"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T04:20:50.550Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://github.com/Sylius/SyliusGridBundle/security/advisories/GHSA-2xmm-g482-4439"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/Sylius/SyliusGridBundle/pull/222"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/Sylius/SyliusGridBundle/commit/73d0791d0575f955e830a3da4c3345f420d2f784"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.10.1"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "https://github.com/Sylius/SyliusGridBundle/releases/tag/v1.11.0-RC.2"}]}, {"metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2025-04-23T15:50:16.970081Z", "id": "CVE-2022-24752", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2025-04-23T18:53:49.773Z"}}]}, "cveMetadata": {"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2022-24752", "datePublished": "2022-03-15T14:40:13.000Z", "dateReserved": "2022-02-10T00:00:00.000Z", "dateUpdated": "2025-04-23T18:53:49.773Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}