First published: Wed Feb 07 2024(Updated: )
### Impact The vulnerability allows unauthenticated execution of arbitrary SQL statements on the database the SQLAlchemyDA instance is connected to. All users are affected. ### Patches The problem has been patched in version 2.2. ### Workarounds There is no workaround. All users are urged to upgrade to version 2.2
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Products.SQLAlchemyDA | <2.2 | 2.2 |
Zope SQLAlchemyDA | <2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-24811 is considered a critical vulnerability due to its ability to allow unauthenticated execution of arbitrary SQL statements on the connected database.
To fix CVE-2024-24811, you should upgrade to version 2.2 or later of Products.SQLAlchemyDA.
All users of Products.SQLAlchemyDA are affected by CVE-2024-24811 regardless of their configuration or usage.
There is no workaround for CVE-2024-24811; the only solution is to upgrade to the patched version.
CVE-2024-24811 was patched in version 2.2 of Products.SQLAlchemyDA.