Debian Security Advisory
DSA-2449-1 sqlalchemy -- missing input sanitization
- Date Reported:
- 12 Apr 2012
- Affected Packages:
- sqlalchemy
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2012-0805.
- More information:
-
It was discovered that SQLAlchemy, an SQL toolkit and object relational mapper for Python, is not sanitizing input passed to the limit/offset keywords to select() as well as the value passed to select.limit()/offset(). This allows an attacker to perform SQL injection attacks against applications using SQLAlchemy that do not implement their own filtering.
For the stable distribution (squeeze), this problem has been fixed in version 0.6.3-3+squeeze1.
For the testing distribution (wheezy), this problem has been fixed in version 0.6.7-1.
For the unstable distribution (sid), this problem has been fixed in version 0.6.7-1.
We recommend that you upgrade your sqlalchemy packages.