Lucene search

K
githubGitHub Advisory DatabaseGHSA-XV6X-43GQ-4HFJ
HistoryMay 02, 2022 - 3:40 a.m.

PyGreSQL Might Be Vulnerable to Encoding-Based SQL Injection

2022-05-0203:40:08
CWE-89
GitHub Advisory Database
github.com
12
pygresql
postgresql
sql injection
multi-byte characters
backward compatibility
escaping functions.

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.3

Confidence

Low

EPSS

0.011

Percentile

84.2%

PyGreSQL 3.8 did not use PostgreSQL’s safe string and bytea functions in its own escaping functions. As a result, applications written to use PyGreSQL’s escaping functions are vulnerable to SQL injections when processing certain multi-byte character sequences. Because the safe functions require a database connection, to maintain backwards compatibility, pg.escape_string() and pg.escape_bytea() are still available, but applications will have to be adjusted to use the new pyobj.escape_string() and pyobj.escape_bytea() functions. For example, code containing:

import pg
connection = pg.connect(...)
escaped = pg.escape_string(untrusted_input)

should be adjusted to use:

import pg
connection = pg.connect(...)
escaped = connection.escape_string(untrusted_input)

Affected configurations

Vulners
Node
pygresqlpygresqlMatch4.0
OR
pygresqlpygresqlRange3.8.1
VendorProductVersionCPE
pygresqlpygresql4.0cpe:2.3:a:pygresql:pygresql:4.0:*:*:*:*:*:*:*
pygresqlpygresql*cpe:2.3:a:pygresql:pygresql:*:*:*:*:*:*:*:*

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

7.3

Confidence

Low

EPSS

0.011

Percentile

84.2%