| Name | CVE-2020-9402 |
| Description | Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-3024-1 |
| Debian Bugs | 953102 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| python-django (PTS) | bullseye | 2:2.2.28-1~deb11u2 | fixed |
| bullseye (security) | 2:2.2.28-1~deb11u9 | fixed | |
| bookworm, bookworm (security) | 3:3.2.19-1+deb12u1 | fixed | |
| trixie | 3:4.2.23-1 | fixed | |
| forky, sid | 3:4.2.25-2 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| python-django | source | jessie | (not affected) | |||
| python-django | source | stretch | 1:1.10.7-2+deb9u17 | DLA-3024-1 | ||
| python-django | source | buster | 1:1.11.29-1~deb10u1 | |||
| python-django | source | (unstable) | 2:2.2.11-1 | low | 953102 |
[jessie] - python-django <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2020/03/04/1
Introduced by: https://github.com/django/django/commit/fcf494b48fea7c0c55ea29721ba0b2d250351ff8
Fixed by: https://github.com/django/django/commit/fe886a3b58a93cfbe8864b485f93cb6d426cd1f2 (v2.2)
Fixed by: https://github.com/django/django/commit/02d97f3c9a88adc890047996e5606180bd1c6166 (v1.11)