First published: Tue Apr 18 2023(Updated: )
Archery is an open source SQL audit platform. The Archery project contains multiple SQL injection vulnerabilities, that may allow an attacker to query the connected databases. Affected versions are subject to SQL injection in the `optimize_sqltuningadvisor` method of `sql_optimize.py`. User input coming from the `db_name` parameter value in `sql_optimize.py` is passed to the `sqltuningadvisor` method in `oracle.py`for execution. To mitigate escape the variables accepted via user input when used in `sql_optimize.py`. Users may also use prepared statements when dealing with SQL as a mitigation for this issue. This issue is also indexed as `GHSL-2022-107`.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Archerydms Archery | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-30556 is a SQL Injection vulnerability in the Archery project.
CVE-2023-30556 has a severity rating of 6.5, which is considered medium.
Archery version 1.9.0 is affected by CVE-2023-30556.
An attacker can exploit CVE-2023-30556 by injecting SQL queries into the 'optimize_sqltuningadvisor' method of 'sql_optimize.py' in Archery.
Yes, updating to a version of Archery that is not affected by CVE-2023-30556 will fix the vulnerability.