CVE-2026-26198
中文标题:
(暂无数据)
英文标题:
ormar is vulnerable to SQL Injection through aggregate functions min() and max()
漏洞描述
中文描述:
(暂无数据)
英文描述:
Ormar is a async mini ORM for Python. In versions 0.9.9 through 0.22.0, when performing aggregate queries, Ormar ORM constructs SQL expressions by passing user-supplied column names directly into `sqlalchemy.text()` without any validation or sanitization. The `min()` and `max()` methods in the `QuerySet` class accept arbitrary string input as the column parameter. While `sum()` and `avg()` are partially protected by an `is_numeric` type check that rejects non-existent fields, `min()` and `max()` skip this validation entirely. As a result, an attacker-controlled string is embedded as raw SQL inside the aggregate function call. Any unauthorized user can exploit this vulnerability to read the entire database contents, including tables unrelated to the queried model, by injecting a subquery as the column parameter. Version 0.23.0 contains a patch.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| collerek | ormar | >= 0.9.9, < 0.23.0 | - | - |
cpe:2.3:a:collerek:ormar:>=_0.9.9,_<_0.23.0:*:*:*:*:*:*:*
|
| collerek | ormar | * | - | - |
cpe:2.3:a:collerek:ormar:*:*:*:*:*:python:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
CVSS评分详情
3.1 (cna)
CRITICALCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2026-26198 |
2026-02-24 03:19:37 | 2026-02-23 22:00:01 |
| NVD | nvd_CVE-2026-26198 |
2026-02-25 02:00:04 | 2026-02-24 22:00:03 |
版本与语言
安全公告
变更历史
查看详细变更
- affected_products_count: 1 -> 2
查看详细变更
- data_sources: ['cve'] -> ['cve', 'nvd']