The PDO adapters of Zend Framework 1 do not filter null bytes values in SQL statements. A PDO adapter can treat null bytes in a query as a string terminator, allowing an attacker to add arbitrary SQL following a null byte, and thus create a SQL injection. This issue has been fixed in upstream version 1.12.16. External References: http://framework.zend.com/security/advisory/ZF2015-08
Created php-ZendFramework tracking bugs for this issue: Affects: epel-all [bug 1269080] Affects: fedora-all [bug 1269081]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.