
Cloud Vulnerability DB
A community-led vulnerabilities database
A vulnerability was discovered in python-sql, a library used for writing SQL queries in a Python-style syntax. The vulnerability (CVE-2024-9774) was identified where unary operators do not properly escape non-Expression elements, potentially leading to security issues. The vulnerability was initially reported on October 9, 2024, and was assigned by Red Hat, Inc. as the CNA (CVE Details, NVD).
The vulnerability is classified under CWE-150 (Improper Neutralization of Escape, Meta, or Control Sequences). According to the Red Hat assessment, it has been assigned a CVSS v3.0 base score of 6.5 (Medium), with the vector string CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N, indicating network accessibility, low attack complexity, and high privileges required for exploitation (NVD).
The vulnerability could potentially result in SQL injection attacks due to insufficient sanitizing of input in the python-sql library. This could lead to unauthorized access to or manipulation of database contents when the vulnerable code is exploited (Debian LTS).
Several distributions have released patches to address this vulnerability. Debian has fixed the issue in version 1.2.1-1+deb11u1 for Debian 11 (Bullseye). Fixed versions are also available for Debian Bookworm (1.4.0-1+deb12u1) and newer releases. Users are recommended to upgrade their python-sql packages to the patched versions (Debian Tracker).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."