aayant-mend / four-goats-of-the-apocalypse

A large repo used for SCA scanning. Contains NodeGoat, WebGoat, WebGoat.NET, and PyGoat.
https://i2-prod.dailystar.co.uk/incoming/article19639978.ece/ALTERNATES/s615b/0_34409
1 stars 6 forks source link

sqlparse-0.3.1-py2.py3-none-any.whl: 3 vulnerabilities (highest severity is: 7.5) #5

Open mend-for-github-com[bot] opened 1 year ago

mend-for-github-com[bot] commented 1 year ago
Vulnerable Library - sqlparse-0.3.1-py2.py3-none-any.whl

A non-validating SQL parser.

Library home page: https://files.pythonhosted.org/packages/85/ee/6e821932f413a5c4b76be9c5936e313e4fc626b33f16e027866e1d60f588/sqlparse-0.3.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Found in HEAD commit: aa225d319bbc2e5a7f67311333ffd522370dca22

Vulnerabilities

CVE Severity CVSS Dependency Type Fixed in (sqlparse version) Remediation Possible**
WS-2021-0369 High 7.5 sqlparse-0.3.1-py2.py3-none-any.whl Direct 0.4.2
CVE-2024-4340 High 7.5 sqlparse-0.3.1-py2.py3-none-any.whl Direct sqlparse - 0.5.0
CVE-2023-30608 Medium 5.5 sqlparse-0.3.1-py2.py3-none-any.whl Direct 0.4.4

**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation

Details

WS-2021-0369 ### Vulnerable Library - sqlparse-0.3.1-py2.py3-none-any.whl

A non-validating SQL parser.

Library home page: https://files.pythonhosted.org/packages/85/ee/6e821932f413a5c4b76be9c5936e313e4fc626b33f16e027866e1d60f588/sqlparse-0.3.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - :x: **sqlparse-0.3.1-py2.py3-none-any.whl** (Vulnerable Library)

Found in HEAD commit: aa225d319bbc2e5a7f67311333ffd522370dca22

Found in base branch: main

### Vulnerability Details

StripComments filter contains a regular expression that is vulnerable to ReDOS (Regular Expression Denial of Service) The formatter function that strips comments from a SQL contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). The regular expression may cause exponential backtracking on strings containing many repetitions of '\r\n' in SQL comments.

Publish Date: 2021-09-10

URL: WS-2021-0369

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/advisories/GHSA-p5w8-wqhj-9hhf

Release Date: 2021-09-10

Fix Resolution: 0.4.2

In order to enable automatic remediation, please create workflow rules

CVE-2024-4340 ### Vulnerable Library - sqlparse-0.3.1-py2.py3-none-any.whl

A non-validating SQL parser.

Library home page: https://files.pythonhosted.org/packages/85/ee/6e821932f413a5c4b76be9c5936e313e4fc626b33f16e027866e1d60f588/sqlparse-0.3.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - :x: **sqlparse-0.3.1-py2.py3-none-any.whl** (Vulnerable Library)

Found in HEAD commit: aa225d319bbc2e5a7f67311333ffd522370dca22

Found in base branch: main

### Vulnerability Details

Passing a heavily nested list to sqlparse.parse() leads to a Denial of Service due to RecursionError.

Publish Date: 2024-04-30

URL: CVE-2024-4340

### CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://www.cve.org/CVERecord?id=CVE-2024-4340

Release Date: 2024-04-30

Fix Resolution: sqlparse - 0.5.0

In order to enable automatic remediation, please create workflow rules

CVE-2023-30608 ### Vulnerable Library - sqlparse-0.3.1-py2.py3-none-any.whl

A non-validating SQL parser.

Library home page: https://files.pythonhosted.org/packages/85/ee/6e821932f413a5c4b76be9c5936e313e4fc626b33f16e027866e1d60f588/sqlparse-0.3.1-py2.py3-none-any.whl

Path to dependency file: /requirements.txt

Path to vulnerable library: /requirements.txt

Dependency Hierarchy: - :x: **sqlparse-0.3.1-py2.py3-none-any.whl** (Vulnerable Library)

Found in HEAD commit: aa225d319bbc2e5a7f67311333ffd522370dca22

Found in base branch: main

### Vulnerability Details

sqlparse is a non-validating SQL parser module for Python. In affected versions the SQL parser contains a regular expression that is vulnerable to ReDoS (Regular Expression Denial of Service). This issue was introduced by commit `e75e358`. The vulnerability may lead to Denial of Service (DoS). This issues has been fixed in sqlparse 0.4.4 by commit `c457abd5f`. Users are advised to upgrade. There are no known workarounds for this issue.

Publish Date: 2023-04-18

URL: CVE-2023-30608

### CVSS 3 Score Details (5.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: None - Integrity Impact: None - Availability Impact: High

For more information on CVSS3 Scores, click here.

### Suggested Fix

Type: Upgrade version

Origin: https://github.com/andialbrecht/sqlparse/security/advisories/GHSA-rrm6-wvj7-cwh2

Release Date: 2023-04-18

Fix Resolution: 0.4.4

In order to enable automatic remediation, please create workflow rules


In order to enable automatic remediation for this issue, please create workflow rules