logo

CVE-2021-30459 django-debug-toolbar

Package

Manager: pip
Name: django-debug-toolbar
Vulnerable Version: >=0.10.0 <1.11.1 || >=2.0a1 <2.2.1 || >=3.0a1 <3.2.1

Severity

Level: High

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U

EPSS: 0.00434 pctl0.61969

Details

SQL Injection via in django-debug-toolbar ### Impact With Django Debug Toolbar attackers are able to execute SQL by changing the `raw_sql` input of the SQL explain, analyze or select forms and submitting the form. **NOTE:** This is a high severity issue for anyone using the toolbar in a **production environment**. Generally the Django Debug Toolbar team only maintains the latest version of django-debug-toolbar, but an exception was made because of the high severity of this issue. ### Patches Please upgrade to one of the following versions, depending on the major version you're using: - Version 1.x: [django-debug-toolbar 1.11.1](https://pypi.org/project/django-debug-toolbar/1.11.1/) - Version 2.x: [django-debug-toolbar 2.2.1](https://pypi.org/project/django-debug-toolbar/2.2.1/) - Version 3.x: [django-debug-toolbar 3.2.1](https://pypi.org/project/django-debug-toolbar/3.2.1/) ### For more information If you have any questions or comments about this advisory: * Open an issue in the [django-debug-toolbar repo](https://github.com/jazzband/django-debug-toolbar/issues/new) (Please NO SENSITIVE INFORMATION, send an email instead!) * Email us at [security@jazzband.co](mailto:security@jazzband.co)

Metadata

Created: 2021-04-16T19:53:28Z
Modified: 2024-09-13T20:10:20Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-pghf-347x-c2gj/GHSA-pghf-347x-c2gj.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-pghf-347x-c2gj
Finding: F297
Auto approve: 1