Mandriva Linux Security Advisory : python-sqlalchemy (MDVSA-2012:059)

High Nessus Plugin ID 61949


The remote Mandriva Linux host is missing a security update.


It was discovered that SQLAlchemy did not sanitize values for the limit and offset keywords for SQL select statements. If an application using SQLAlchemy accepted values for these keywords, and did not filter or sanitize them before passing them to SQLAlchemy, it could allow an attacker to perform a SQL injection attack against the application (CVE-2012-0805).

The updated packages have been patched to correct this issue.


Update the affected python-sqlalchemy package.

Plugin Details

Severity: High

ID: 61949

File Name: mandriva_MDVSA-2012-059.nasl

Version: $Revision: 1.6 $

Type: local

Published: 2012/09/06

Modified: 2016/05/17

Dependencies: 12634

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:python-sqlalchemy, cpe:/o:mandriva:linux:2011

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/04/16

Reference Information

CVE: CVE-2012-0805

BID: 52330

MDVSA: 2012:059