CVE-2020-9402

NameCVE-2020-9402
DescriptionDjango 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh
Debian Bugs953102

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)stretch1:1.10.7-2+deb9u7vulnerable
stretch (security)1:1.10.7-2+deb9u9vulnerable
buster1:1.11.28-1~deb10u1vulnerable
buster (security)1:1.11.29-1~deb10u1fixed
bullseye, sid2:2.2.14-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosource(unstable)2:2.2.11-1low953102
python-djangosourcebuster1:1.11.29-1~deb10u1
python-djangosourcejessie(not affected)

Notes

[stretch] - python-django <postponed> (Can be fixed along in a future DSA)
[jessie] - python-django <not-affected> (Vulnerable code introduced later)
https://www.openwall.com/lists/oss-security/2020/03/04/1
Introduced by: https://github.com/django/django/commit/fcf494b48fea7c0c55ea29721ba0b2d250351ff8
Fixed by: https://github.com/django/django/commit/fe886a3b58a93cfbe8864b485f93cb6d426cd1f2 (v2.2)
Fixed by: https://github.com/django/django/commit/02d97f3c9a88adc890047996e5606180bd1c6166 (v1.11)

Search for package or bug name: Reporting problems