Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Snyk: Critical/High] Django SQL Injection and Command Injection due by 01/10/2025 #6591

Open
2 tasks
pkfec opened this issue Dec 11, 2024 · 0 comments
Open
2 tasks
Labels
Security: general General security concern or issue Security: high Remediate within 30 days
Milestone

Comments

@pkfec
Copy link
Contributor

pkfec commented Dec 11, 2024

[SNYK: Critical] Django SQL Injection :

https://app.snyk.io/vuln/SNYK-PYTHON-DJANGO-8456316

Introduced through

[email protected], [email protected] and others

Fixed in

[email protected], @5.0.10, @5.1.4

Security information

Factors contributing to the scoring:
Snyk: CVSS v4.0 9.3 - Critical Severity | CVSS v3.1 9.1 - Critical Severity
NVD: Not available. NVD has not yet published its analysis.
Why are the scores different? Learn how Snyk evaluates vulnerability scores

Overview

Affected versions of this package are vulnerable to SQL Injection via the django.db.models.fields.json.HasKey lookup on Oracle, if untrusted data is used as a lhs value. An attacker can manipulate SQL queries and access or alter database information.

Note: Applications that use the jsonfield.has_key lookup through the __ syntax are unaffected.


[SNYK: High] Django Command Injection:

https://app.snyk.io/vuln/SNYK-PYTHON-DJANGO-8456315

Introduced through

[email protected], [email protected] and others

Fixed in

[email protected], @5.0.10, @5.1.4

Security information

Factors contributing to the scoring:
Snyk: CVSS v4.0 7.1 - High Severity | CVSS v3.1 6.5 - Medium Severity
NVD: Not available. NVD has not yet published its analysis.
Why are the scores different? Learn how Snyk evaluates vulnerability scores

Overview

Affected versions of this package are vulnerable to Command Injection via certain inputs containing large sequences of nested incomplete HTML entities submitted to the strip_tags function and striptags template filter. An attacker can cause the application to consume excessive resources.

Action items

Completion criteria

  • Django SQL Injection and Command Injection vulnerabilities no longer show after upgrading to v4.2.17
@pkfec pkfec added Security: high Remediate within 30 days Security: general General security concern or issue labels Dec 11, 2024
@pkfec pkfec changed the title [Snyk: Critical/High] Django SQL Injection and Command Injection [Snyk: Critical/High] Django SQL Injection and Command Injection due by 01/10/2025 Dec 11, 2024
@pkfec pkfec added this to the 27.2 milestone Dec 11, 2024
@pkfec pkfec moved this to 🗄️ PI backlog in Website project Dec 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Security: general General security concern or issue Security: high Remediate within 30 days
Projects
Status: 🗄️ PI backlog
Development

No branches or pull requests

1 participant