Описание
A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
EPSS
6.3 Medium
CVSS3
6.5 Medium
CVSS2
Дефекты
Связанные уязвимости
A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
A vulnerability, which was classified as critical, was found in webpy ...
A vulnerability, which was classified as critical, was found in webpy web.py 0.70. Affected is the function PostgresDB._process_insert_query of the file web/db.py. The manipulation of the argument seqname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
Уязвимость функции PostgresDB._process_insert_query() (file web/db.py) веб-фреймворка создания веб-приложений web.py, позволяющая нарушителю выполнить произвольные SQL-команды
EPSS
6.3 Medium
CVSS3
6.5 Medium
CVSS2