Update dependency pymysql to v1.1.1 [SECURITY]
This PR contains the following updates:
| Package | Change | Age | Confidence |
|---|---|---|---|
| pymysql (changelog) | 1.1.0 -> 1.1.1 |
||
| pymysql (changelog) | ==1.1.0 -> ==1.1.1 |
GitHub Vulnerability Alerts
CVE-2024-36039
PyMySQL through 1.1.0 allows SQL injection if used with untrusted JSON input because keys are not escaped by escape_dict.
Release Notes
PyMySQL/PyMySQL (pymysql)
v1.1.1
Release date: 2024-05-21
[!WARNING] This release fixes a vulnerability (CVE-2024-36039). All users are recommended to update to this version.
If you can not update soon, check the input value from untrusted source has an expected type. Only dict input from untrusted source can be an attack vector.
- Prohibit dict parameter for
Cursor.execute(). It didn't produce valid SQL and might cause SQL injection. (CVE-2024-36039) - Added ssl_key_password param. #โ1145
Configuration
๐ Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).
๐ฆ Automerge: Disabled by config. Please merge this manually once you are satisfied.
โป Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
๐ Ignore: Close this PR and you won't be reminded about these updates again.
- [ ] If you want to rebase/retry this PR, check this box
This PR was generated by Mend Renovate. View the repository job log.
Quality Gate passed
Issues
0 New issues
0 Accepted issues
Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code
Quality Gate passed
Issues
0 New issues
0 Accepted issues
Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code
Quality Gate passed
Issues
0 New issues
0 Accepted issues
Measures
0 Security Hotspots
0.0% Coverage on New Code
0.0% Duplication on New Code