Skip to content

Commit 7283849

Browse files
1 parent 5dfd548 commit 7283849

File tree

4 files changed

+174
-84
lines changed

4 files changed

+174
-84
lines changed
Lines changed: 78 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,78 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-6497-prx7-gpmq",
4+
"modified": "2026-02-01T18:09:10Z",
5+
"published": "2026-01-30T21:30:22Z",
6+
"aliases": [
7+
"CVE-2025-69662"
8+
],
9+
"summary": "geopandas SQL Injection Vulnerability in to_postgis() Allows Information Disclosure",
10+
"details": "SQL injection vulnerability in geopandas before v.1.1.2 allows an attacker to obtain sensitive information via the to_postgis()` function being used to write GeoDataFrames to a PostgreSQL database.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "geopandas"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "0"
29+
},
30+
{
31+
"fixed": "1.1.2"
32+
}
33+
]
34+
}
35+
]
36+
}
37+
],
38+
"references": [
39+
{
40+
"type": "ADVISORY",
41+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-69662"
42+
},
43+
{
44+
"type": "WEB",
45+
"url": "https://github.com/geopandas/geopandas/issues/3679"
46+
},
47+
{
48+
"type": "WEB",
49+
"url": "https://github.com/geopandas/geopandas/pull/3681"
50+
},
51+
{
52+
"type": "WEB",
53+
"url": "https://github.com/geopandas/geopandas/commit/6aa8ef14ffdee4ba1044349ab948e1a1fbfaf419"
54+
},
55+
{
56+
"type": "WEB",
57+
"url": "https://aydinnyunus.github.io/2025/12/27/sql-injection-geopandas"
58+
},
59+
{
60+
"type": "PACKAGE",
61+
"url": "https://github.com/geopandas/geopandas"
62+
},
63+
{
64+
"type": "WEB",
65+
"url": "https://github.com/geopandas/geopandas/releases/tag/v1.1.2"
66+
}
67+
],
68+
"database_specific": {
69+
"cwe_ids": [
70+
"CWE-202",
71+
"CWE-89"
72+
],
73+
"severity": "HIGH",
74+
"github_reviewed": true,
75+
"github_reviewed_at": "2026-02-01T18:09:10Z",
76+
"nvd_published_at": "2026-01-30T19:16:11Z"
77+
}
78+
}
Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vcf3-26xf-fw4m",
4+
"modified": "2026-02-01T18:09:41Z",
5+
"published": "2026-01-30T21:30:22Z",
6+
"aliases": [
7+
"CVE-2025-62349"
8+
],
9+
"summary": "Salt Authentication Protocol Version Downgrade Allows Minion Impersonation",
10+
"details": "Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L"
15+
},
16+
{
17+
"type": "CVSS_V4",
18+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N"
19+
}
20+
],
21+
"affected": [
22+
{
23+
"package": {
24+
"ecosystem": "PyPI",
25+
"name": "salt"
26+
},
27+
"ranges": [
28+
{
29+
"type": "ECOSYSTEM",
30+
"events": [
31+
{
32+
"introduced": "3006.12"
33+
},
34+
{
35+
"fixed": "3006.17"
36+
}
37+
]
38+
}
39+
]
40+
},
41+
{
42+
"package": {
43+
"ecosystem": "PyPI",
44+
"name": "salt"
45+
},
46+
"ranges": [
47+
{
48+
"type": "ECOSYSTEM",
49+
"events": [
50+
{
51+
"introduced": "3007.4"
52+
},
53+
{
54+
"fixed": "3007.9"
55+
}
56+
]
57+
}
58+
]
59+
}
60+
],
61+
"references": [
62+
{
63+
"type": "ADVISORY",
64+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-62349"
65+
},
66+
{
67+
"type": "WEB",
68+
"url": "https://github.com/saltstack/salt/issues/68467"
69+
},
70+
{
71+
"type": "WEB",
72+
"url": "https://github.com/saltstack/salt/commit/3d5708acae16d039a1e2b5529c8e14a0d3255611"
73+
},
74+
{
75+
"type": "WEB",
76+
"url": "https://docs.saltproject.io/en/latest/topics/releases/3006.17.html"
77+
},
78+
{
79+
"type": "WEB",
80+
"url": "https://docs.saltproject.io/en/latest/topics/releases/3007.9.html"
81+
},
82+
{
83+
"type": "PACKAGE",
84+
"url": "https://github.com/saltstack/salt"
85+
}
86+
],
87+
"database_specific": {
88+
"cwe_ids": [
89+
"CWE-287"
90+
],
91+
"severity": "HIGH",
92+
"github_reviewed": true,
93+
"github_reviewed_at": "2026-02-01T18:09:41Z",
94+
"nvd_published_at": "2026-01-30T19:16:11Z"
95+
}
96+
}

advisories/unreviewed/2026/01/GHSA-6497-prx7-gpmq/GHSA-6497-prx7-gpmq.json

Lines changed: 0 additions & 40 deletions
This file was deleted.

advisories/unreviewed/2026/01/GHSA-vcf3-26xf-fw4m/GHSA-vcf3-26xf-fw4m.json

Lines changed: 0 additions & 44 deletions
This file was deleted.

0 commit comments

Comments
 (0)