First published: Tue Jun 05 2012(Updated: )
Multiple SQL injection vulnerabilities in SQLAlchemy before 0.7.0b4, as used in Keystone, allow remote attackers to execute arbitrary SQL commands via the (1) limit or (2) offset keyword to the select function, or unspecified vectors to the (3) select.limit or (4) select.offset function.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Sqlalchemy Sqlalchemy | <=0.7.0 | |
Sqlalchemy Sqlalchemy | =0.6.0 | |
Sqlalchemy Sqlalchemy | =0.6.0-beta1 | |
Sqlalchemy Sqlalchemy | =0.6.0-beta2 | |
Sqlalchemy Sqlalchemy | =0.6.0-beta3 | |
Sqlalchemy Sqlalchemy | =0.6.1 | |
Sqlalchemy Sqlalchemy | =0.6.2 | |
Sqlalchemy Sqlalchemy | =0.6.3 | |
Sqlalchemy Sqlalchemy | =0.6.4 | |
Sqlalchemy Sqlalchemy | =0.6.5 | |
Sqlalchemy Sqlalchemy | =0.6.6 | |
Sqlalchemy Sqlalchemy | =0.6.7 | |
Sqlalchemy Sqlalchemy | =0.7.0-b1 | |
Sqlalchemy Sqlalchemy | =0.7.0-b2 | |
pip/SQLAlchemy | <0.7.0b4 | 0.7.0b4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.