logo

CVE-2020-7471 django

Package

Manager: pip
Name: django
Vulnerable Version: >=0 <1.11.28 || >=2.0 <2.2.10 || >=3.0 <3.0.3

Severity

Level: Critical

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.07771 pctl0.91598

Details

SQL injection in Django Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.

Metadata

Created: 2020-02-11T21:03:20Z
Modified: 2024-09-20T15:03:11Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/02/GHSA-hmr4-m2h5-33qx/GHSA-hmr4-m2h5-33qx.json
CWE IDs: ["CWE-89"]
Alternative ID: GHSA-hmr4-m2h5-33qx
Finding: F297
Auto approve: 1