Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-1531: avoid SQL injection exploits · RTXteam/RTX@fa2797e

SQL injection vulnerability in ARAX-UI Synonym Lookup functionality in GitHub repository rtxteam/rtx prior to checkpoint_2022-04-20 . This vulnerability is critical as it can lead to remote code execution and thus complete server takeover.

CVE
#sql#vulnerability#git#rce

@@ -23,6 +23,7 @@ def load(): database_name = f"{autocomplete_filepath}{os.path.sep}{RTXConfig.autocomplete_path.split(‘/’)[-1]}" conn = sqlite3.connect(database_name) cursor = conn.cursor() #print(f"INFO: Connected to {database_name}",file=sys.stderr) return True

@@ -39,6 +40,9 @@ def get_nodes_like(word,requested_limit): if len(word) < 2: return values
#### Try to avoid SQL injection exploits by sanitizing input #1823 word = word.replace(‘"’,’’)
floor = word[:-1] ceiling = floor + ‘zz’
@@ -103,8 +107,12 @@ def get_nodes_like(word,requested_limit): if found_fragment is None:
#### Cache this fragment in the database cursor.execute("INSERT INTO cached_fragments(fragment) VALUES(?)", (word,)) fragment_id = cursor.lastrowid try: cursor.execute("INSERT INTO cached_fragments(fragment) VALUES(?)", (word,)) fragment_id = cursor.lastrowid except: print(f"ERROR: Unable to INSERT into cached_fragments(fragment)“,file=sys.stderr) fragment_id = 0 if debug: print(f"fragment_id = {fragment_id}”)

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907