|Category:||Red Hat Local Security Checks|
|Title:||RedHat Update for python-sqlalchemy RHSA-2012:0369-01|
|Summary:||The remote host is missing an update for the 'python-sqlalchemy'; package(s) announced via the referenced advisory.|
The remote host is missing an update for the 'python-sqlalchemy'
package(s) announced via the referenced advisory.
SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible,
high-level interface to SQL databases.
It was discovered that SQLAlchemy did not sanitize values for the limit and
offset keywords for SQL select statements. If an application using
SQLAlchemy accepted values for these keywords, and did not filter or
sanitize them before passing them to SQLAlchemy, it could allow an attacker
to perform an SQL injection attack against the application. (CVE-2012-0805)
All users of python-sqlalchemy are advised to upgrade to this updated
package, which contains a patch to correct this issue. All running
applications using SQLAlchemy must be restarted for this update to take
python-sqlalchemy on Red Hat Enterprise Linux Server (v. 6),
Red Hat Enterprise Linux Workstation (v. 6)
Please Install the Updated Packages.
Common Vulnerability Exposure (CVE) ID: CVE-2012-0805|
Debian Security Information: DSA-2449 (Google Search)
RedHat Security Advisories: RHSA-2012:0369
XForce ISS Database: sqlalchemy-select-sql-injection(73756)
|Copyright||Copyright (c) 2012 Greenbone Networks GmbH|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.