CVE-2021-35042

NameCVE-2021-35042
DescriptionDjango 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)stretch1:1.10.7-2+deb9u9fixed
stretch (security)1:1.10.7-2+deb9u14fixed
buster, buster (security)1:1.11.29-1~deb10u1fixed
bookworm, bullseye2:2.2.24-1fixed
sid2:3.2.8-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosource(unstable)(not affected)

Notes

- python-django <not-affected> (Vulnerable code introduced in 3.1)
https://www.djangoproject.com/weblog/2021/jul/01/security-releases/
Issue did affect only the experimental version and fixed in 2:3.2.5-1

Search for package or bug name: Reporting problems