PyGreSQL Might Be Vulnerable to Encoding-Based SQL Injection
High severity
GitHub Reviewed
Published
May 2, 2022
to the GitHub Advisory Database
•
Updated Feb 8, 2024
Description
Published by the National Vulnerability Database
Oct 22, 2009
Published to the GitHub Advisory Database
May 2, 2022
Reviewed
Feb 8, 2024
Last updated
Feb 8, 2024
PyGreSQL 3.8 did not use PostgreSQL’s safe
string
andbytea
functions in its own escaping functions. As a result, applications written to use PyGreSQL’s escaping functions are vulnerable to SQL injections when processing certain multi-byte character sequences. Because the safe functions require a database connection, to maintain backwards compatibility,pg.escape_string()
andpg.escape_bytea()
are still available, but applications will have to be adjusted to use the newpyobj.escape_string()
andpyobj.escape_bytea()
functions. For example, code containing:should be adjusted to use:
References