Ecosyste.ms: Advisories

An open API service providing security vulnerability metadata for many open source software ecosystems.

Security Advisories: GSA_kwCzR0hTQS1nbXBxLXhyeGoteGg4bc4AAv0j

Arches vulnerable to execution of arbitrary SQL

Impact

With a carefully crafted web request, it's possible to execute certain unwanted sql statements against the database.
Anyone running the impacted versions (<=6.1.1, 6.2.0, >=7.0.0, <=7.1.1) should upgrade as soon as possible.

Patches

The problem has been patched in the following versions: 6.1.2, 6.2.1, and 7.2.0
Users are strongly urged to upgrade to the most recent relevant patch.

Workarounds

There are no workarounds.

General References

https://www.w3schools.com/sql/sql_injection.asp
https://en.wikipedia.org/wiki/SQL_injection

For more information

Post any questions to the Arches project forum.

Permalink: https://github.com/advisories/GHSA-gmpq-xrxj-xh8m
JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS1nbXBxLXhyeGoteGg4bc4AAv0j
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: almost 2 years ago
Updated: 2 months ago


CVSS Score: 8.6
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L

Identifiers: GHSA-gmpq-xrxj-xh8m, CVE-2022-41892
References: Repository: https://github.com/archesproject/arches
Blast Radius: 2.6

Affected Packages

pypi:arches
Dependent packages: 1
Dependent repositories: 2
Downloads: 24,945 last month
Affected Version Ranges: >= 7.0.0, <= 7.1.1, = 6.2.0, <= 6.1.1
Fixed in: 7.2.0, 6.2.1, 6.1.2
All affected versions: 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.1.1, 3.1.2, 4.0.1, 4.1.1, 4.3.1, 4.3.2, 4.3.3, 4.4.1, 4.4.2, 4.4.3, 5.1.0, 5.1.1, 5.1.2, 5.1.3, 5.1.4, 6.0.0, 6.0.1, 6.1.0, 6.1.1, 6.2.0, 7.0.0, 7.1.0, 7.1.1
All unaffected versions: 6.1.2, 6.2.1, 6.2.2, 6.2.3, 6.2.4, 6.2.5, 6.2.6, 6.2.7, 6.2.8, 6.2.9, 7.2.0, 7.2.1, 7.3.0, 7.4.0, 7.4.1, 7.4.2, 7.4.3, 7.4.4, 7.5.0, 7.5.1, 7.5.2, 7.5.3, 7.5.4, 7.5.5, 7.6.0, 7.6.1, 7.6.2