Summary
The remote host is missing an update to sqlalchemy announced via advisory DSA 2449-1.
Solution
https://secure1.securityspace.com/smysecure/catid.html?in=DSA%202449-1
Insight
It was discovered that sqlalchemy, an SQL toolkit and object relational mapper for python, is not sanitizing input passed to the limit/offset keywords to select() as well as the value passed to select.limit()/offset().
This allows an attacker to perform SQL injection attacks against applications using sqlalchemy that do not implement their own filtering.
For the stable distribution (squeeze), this problem has been fixed in version 0.6.3-3+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in version 0.6.7-1.
For the unstable distribution (sid), this problem has been fixed in version 0.6.7-1.
We recommend that you upgrade your sqlalchemy packages.
Severity
Classification
-
CVE CVE-2012-0805 -
CVSS Base Score: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
Related Vulnerabilities