Name | CVE-2020-7471 |
Description | Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-4629-1 |
Debian Bugs | 950581 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-django (PTS) | bullseye (security), bullseye | 2:2.2.28-1~deb11u2 | fixed |
bookworm, bookworm (security) | 3:3.2.19-1+deb12u1 | fixed | |
sid, trixie | 3:4.2.16-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-django | source | jessie | (not affected) | |||
python-django | source | stretch | 1:1.10.7-2+deb9u8 | DSA-4629-1 | ||
python-django | source | buster | 1:1.11.28-1~deb10u1 | DSA-4629-1 | ||
python-django | source | (unstable) | 2:2.2.10-1 | 950581 |
[jessie] - python-django <not-affected> (Vulnerable code introduced in Django ~1.9)
https://www.djangoproject.com/weblog/2020/feb/03/security-releases/
https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136 (master)
https://github.com/django/django/commit/505826b469b16ab36693360da9e11fd13213421b (3.0.3)
https://github.com/django/django/commit/c67a368c16e4680b324b4f385398d638db4d8147 (2.2.10)
https://github.com/django/django/commit/001b0634cd309e372edb6d7d95d083d02b8e37bd (1.11.28)