Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-gmpq-xrxj-xh8m

Опубликовано: 11 нояб. 2022
Источник: github
Github: Прошло ревью
CVSS3: 8.6

Описание

Arches vulnerable to execution of arbitrary SQL

Impact

With a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database.
Anyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible.

Patches

The problem has been patched in the following versions: 6.1.2, 6.2.1, and 7.2.0 Users are strongly urged to upgrade to the most recent relevant patch.

Workarounds

There are no workarounds.

General References

https://www.w3schools.com/sql/sql_injection.asp https://en.wikipedia.org/wiki/SQL_injection

For more information

Post any questions to the Arches project forum.

Пакеты

Наименование

arches

pip
Затронутые версииВерсия исправления

<= 6.1.1

6.1.2

Наименование

arches

pip
Затронутые версииВерсия исправления

= 6.2.0

6.2.1

Наименование

arches

pip
Затронутые версииВерсия исправления

>= 7.0.0, <= 7.1.1

7.2.0

EPSS

Процентиль: 33%
0.00127
Низкий

8.6 High

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 8.6
nvd
около 3 лет назад

Arches is a web platform for creating, managing, & visualizing geospatial data. Versions prior to 6.1.2, 6.2.1, and 7.1.2 are vulnerable to SQL Injection. With a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database. This issue is fixed in version 7.12, 6.2.1, and 6.1.2. Users are recommended to upgrade as soon as possible. There are no workarounds.

EPSS

Процентиль: 33%
0.00127
Низкий

8.6 High

CVSS3

Дефекты

CWE-89