Name | CVE-2020-9402 |
Description | Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3024-1 |
Debian Bugs | 953102 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
python-django (PTS) | bullseye (security), bullseye | 2:2.2.28-1~deb11u2 | fixed |
bookworm, bookworm (security) | 3:3.2.19-1+deb12u1 | fixed | |
sid, trixie | 3:4.2.16-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
python-django | source | jessie | (not affected) | |||
python-django | source | stretch | 1:1.10.7-2+deb9u17 | DLA-3024-1 | ||
python-django | source | buster | 1:1.11.29-1~deb10u1 | |||
python-django | source | (unstable) | 2:2.2.11-1 | low | 953102 |
[jessie] - python-django <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2020/03/04/1
Introduced by: https://github.com/django/django/commit/fcf494b48fea7c0c55ea29721ba0b2d250351ff8
Fixed by: https://github.com/django/django/commit/fe886a3b58a93cfbe8864b485f93cb6d426cd1f2 (v2.2)
Fixed by: https://github.com/django/django/commit/02d97f3c9a88adc890047996e5606180bd1c6166 (v1.11)