Mandriva Linux Security Advisory : python-sqlalchemy (MDVSA-2012:059)

high Nessus Plugin ID 61949

Synopsis

The remote Mandriva Linux host is missing a security update.

Description

It was discovered that SQLAlchemy did not sanitize values for the limit and offset keywords for SQL select statements. If an application using SQLAlchemy accepted values for these keywords, and did not filter or sanitize them before passing them to SQLAlchemy, it could allow an attacker to perform a SQL injection attack against the application (CVE-2012-0805).

The updated packages have been patched to correct this issue.

Solution

Update the affected python-sqlalchemy package.

Plugin Details

Severity: High

ID: 61949

File Name: mandriva_MDVSA-2012-059.nasl

Version: 1.10

Type: local

Published: 9/6/2012

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:mandriva:linux:python-sqlalchemy, cpe:/o:mandriva:linux:2011

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/Mandrake/release, Host/Mandrake/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 4/16/2012

Reference Information

CVE: CVE-2012-0805

BID: 52330

MDVSA: 2012:059