| Advisory
Products
MOOLE SCA
Continuous visibility into open-source risk
MOOLE Container Security
End-to-end container defense across the SDLC
MOOLE SAST
Static application security testing for source code
About Us
CVE-2019-7548
Vulnerability Database
pypi
CVE-2019-7548
Base Score
HIGH
7.8
CVE-2019-7548
SQLAlchemy 1.2.17 has SQL Injection when the group_by parameter can be controlled.
Vector
LOCAL
Published By
cve@mitre.org
Published Date
Feb 06, 2019, 21:29
Affected Versions
(1)
SQLAlchemy
(PyPI)
Introduced
0
Fixed
1.2.19
Limit
N/A
Package (Ecosystem)
Introduced
Fixed
Limit
SQLAlchemy
(PyPI)
0
1.2.19
N/A
Weakness Type (CWE)
:
CWE-89
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH
References
http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00087.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00010.html
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00016.html
https://access.redhat.com/errata/RHSA-2019:0981
https://access.redhat.com/errata/RHSA-2019:0984
https://github.com/no-security/sqlalchemy_test
https://github.com/sqlalchemy/sqlalchemy/issues/4481#issuecomment-461204518
https://lists.debian.org/debian-lts-announce/2019/03/msg00020.html
https://lists.debian.org/debian-lts-announce/2021/11/msg00005.html
https://www.oracle.com/security-alerts/cpujan2021.html
Base Score
HIGH
7.8
Weakness Type (CWE)
:
CWE-89
CVSS Metrics
CVSS v3.1
CVSS v2
Base Score
7.8
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Base Severity
HIGH
Version
3.1
Attack Vector (AV)
LOCAL
Attack Complexity (AC)
LOW
Privileges Required (PR)
NONE
User Interaction (UI)
REQUIRED
Scope (S)
UNCHANGED
Confidentiality (C)
HIGH
Integrity (I)
HIGH
Availability (A)
HIGH