CVE-2019-7164: SQLAlchemy vulnerable to SQL Injection via order_by parameter
(updated )
SQLAlchemy through 1.2.17 and 1.3.x through 1.3.0b2 allows SQL Injection via the order_by parameter.
References
- access.redhat.com/errata/RHSA-2019:0981
- access.redhat.com/errata/RHSA-2019:0984
- github.com/advisories/GHSA-887w-45rq-vxgf
- github.com/pypa/advisory-database/tree/main/vulns/sqlalchemy/PYSEC-2019-123.yaml
- github.com/sqlalchemy/sqlalchemy
- github.com/sqlalchemy/sqlalchemy/commit/30307c4616ad67c01ddae2e1e8e34fabf6028414
- github.com/sqlalchemy/sqlalchemy/issues/4481
- lists.debian.org/debian-lts-announce/2019/03/msg00020.html
- lists.debian.org/debian-lts-announce/2021/11/msg00005.html
- nvd.nist.gov/vuln/detail/CVE-2019-7164
- www.oracle.com/security-alerts/cpujan2021.html
Detect and mitigate CVE-2019-7164 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →