![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.881193 |
Category: | CentOS Local Security Checks |
Title: | CentOS Update for python-sqlalchemy CESA-2012:0369 centos6 |
Summary: | The remote host is missing an update for the 'python-sqlalchemy'; package(s) announced via the referenced advisory. |
Description: | Summary: The remote host is missing an update for the 'python-sqlalchemy' package(s) announced via the referenced advisory. Vulnerability Insight: SQLAlchemy is an Object Relational Mapper (ORM) that provides a flexible, high-level interface to SQL databases. It was discovered that SQLAlchemy did not sanitize values for the limit and offset keywords for SQL select statements. If an application using SQLAlchemy accepted values for these keywords, and did not filter or sanitize them before passing them to SQLAlchemy, it could allow an attacker to perform an SQL injection attack against the application. (CVE-2012-0805) All users of python-sqlalchemy are advised to upgrade to this updated package, which contains a patch to correct this issue. All running applications using SQLAlchemy must be restarted for this update to take effect. Affected Software/OS: python-sqlalchemy on CentOS 6 Solution: Please install the updated packages. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2012-0805 48327 http://secunia.com/advisories/48327 48328 http://secunia.com/advisories/48328 48771 http://secunia.com/advisories/48771 DSA-2449 http://www.debian.org/security/2012/dsa-2449 MDVSA-2012:059 http://www.mandriva.com/security/advisories?name=MDVSA-2012:059 RHSA-2012:0369 http://rhn.redhat.com/errata/RHSA-2012-0369.html http://www.sqlalchemy.org/changelog/CHANGES_0_7_0 http://www.sqlalchemy.org/trac/changeset/852b6a1a87e7/ https://bugs.launchpad.net/keystone/+bug/918608 sqlalchemy-select-sql-injection(73756) https://exchange.xforce.ibmcloud.com/vulnerabilities/73756 |
Copyright | Copyright (C) 2012 Greenbone AG |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |