← Volver a CVEs
CVE-2020-7471
CRITICAL9.8
Descripcion
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
Detalles CVE
Puntuacion CVSS v3.19.8
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado2/3/2020
Ultima modificacion11/21/2024
Fuentenvd
Avistamientos honeypot0
Productos afectados
djangoproject:django
Debilidades (CWE)
CWE-89
Referencias
http://www.openwall.com/lists/oss-security/2020/02/03/1(cve@mitre.org)
https://docs.djangoproject.com/en/3.0/releases/security/(cve@mitre.org)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/(cve@mitre.org)
https://seclists.org/bugtraq/2020/Feb/30(cve@mitre.org)
https://security.gentoo.org/glsa/202004-17(cve@mitre.org)
https://security.netapp.com/advisory/ntap-20200221-0006/(cve@mitre.org)
https://usn.ubuntu.com/4264-1/(cve@mitre.org)
https://www.debian.org/security/2020/dsa-4629(cve@mitre.org)
https://www.openwall.com/lists/oss-security/2020/02/03/1(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2020/02/03/1(af854a3a-2127-422b-91ae-364da2661108)
https://docs.djangoproject.com/en/3.0/releases/security/(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136(af854a3a-2127-422b-91ae-364da2661108)
https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2020/Feb/30(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202004-17(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200221-0006/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4264-1/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4629(af854a3a-2127-422b-91ae-364da2661108)
https://www.djangoproject.com/weblog/2020/feb/03/security-releases/(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2020/02/03/1(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.