CVE-2022-28347

NameCVE-2022-28347
DescriptionA SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-5254-1
Debian Bugs1009677

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)bullseye (security), bullseye2:2.2.28-1~deb11u2fixed
bookworm, bookworm (security)3:3.2.19-1+deb12u1fixed
trixie3:4.2.16-1fixed
sid3:4.2.17-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosourcestretch(not affected)
python-djangosourcebuster(not affected)
python-djangosourcebullseye2:2.2.28-1~deb11u1DSA-5254-1
python-djangosource(unstable)2:3.2.13-11009677

Notes

[buster] - python-django <not-affected> (Vulnerable code not present)
[stretch] - python-django <not-affected> (Vulnerable code not present)
https://www.djangoproject.com/weblog/2022/apr/11/security-releases/
https://github.com/django/django/commit/6723a26e59b0b5429a0c5873941e01a2e1bdbb81 (main)
https://github.com/django/django/commit/00b0fc50e1738c7174c495464a5ef069408a4402 (4.0.4)
https://github.com/django/django/commit/9e19accb6e0a00ba77d5a95a91675bf18877c72d (3.2.13)
https://github.com/django/django/commit/29a6c98b4c13af82064f993f0acc6e8fafa4d3f5 (2.2.28)

Search for package or bug name: Reporting problems