cvelist/2021/30xxx/CVE-2021-30459.json

72 lines
2.4 KiB
JSON
Raw Normal View History

2021-04-08 13:00:43 +00:00
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
2021-04-14 18:00:44 +00:00
"ID": "CVE-2021-30459",
"STATE": "PUBLIC"
2021-04-08 13:00:43 +00:00
},
2021-04-14 18:00:44 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
2021-04-08 13:00:43 +00:00
"description": {
"description_data": [
{
"lang": "eng",
2021-04-14 18:00:44 +00:00
"value": "A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://github.com/jazzband/django-debug-toolbar/releases",
"refsource": "MISC",
"name": "https://github.com/jazzband/django-debug-toolbar/releases"
},
{
"refsource": "CONFIRM",
"name": "https://github.com/jazzband/django-debug-toolbar/security/advisories/GHSA-pghf-347x-c2gj",
"url": "https://github.com/jazzband/django-debug-toolbar/security/advisories/GHSA-pghf-347x-c2gj"
},
{
"refsource": "CONFIRM",
"name": "https://www.djangoproject.com/weblog/2021/apr/14/debug-toolbar-security-releases/",
"url": "https://www.djangoproject.com/weblog/2021/apr/14/debug-toolbar-security-releases/"
2021-04-08 13:00:43 +00:00
}
]
}
}