2020-01-21 17:01:08 +00:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org" ,
2020-02-03 12:01:12 +00:00
"ID" : "CVE-2020-7471" ,
"STATE" : "PUBLIC"
2020-01-21 17:01:08 +00:00
} ,
2020-02-03 12:01:12 +00:00
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a" ,
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
} ,
"vendor_name" : "n/a"
}
]
}
} ,
"data_format" : "MITRE" ,
"data_type" : "CVE" ,
"data_version" : "4.0" ,
2020-01-21 17:01:08 +00:00
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2020-02-03 12:01:12 +00:00
"value" : "Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL."
}
]
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "n/a"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM" ,
"name" : "https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI" ,
"url" : "https://groups.google.com/forum/#!topic/django-announce/X45S86X5bZI"
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://docs.djangoproject.com/en/3.0/releases/security/" ,
"url" : "https://docs.djangoproject.com/en/3.0/releases/security/"
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://www.openwall.com/lists/oss-security/2020/02/03/1" ,
"url" : "https://www.openwall.com/lists/oss-security/2020/02/03/1"
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/" ,
"url" : "https://www.djangoproject.com/weblog/2020/feb/03/security-releases/"
2020-02-03 13:01:17 +00:00
} ,
{
"refsource" : "MLIST" ,
"name" : "[oss-security] 20200203 Django 3.0.3, 2.2.10 and 1.11.28: CVE-2020-7471: Potential SQL injection via ``StringAgg(delimiter)``" ,
"url" : "http://www.openwall.com/lists/oss-security/2020/02/03/1"
2020-02-03 15:01:20 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136" ,
"url" : "https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136"
2020-02-06 20:01:10 +00:00
} ,
{
"refsource" : "UBUNTU" ,
"name" : "USN-4264-1" ,
"url" : "https://usn.ubuntu.com/4264-1/"
2020-02-19 16:01:16 +00:00
} ,
{
"refsource" : "BUGTRAQ" ,
"name" : "20200219 [SECURITY] [DSA 4629-1] python-django security update" ,
"url" : "https://seclists.org/bugtraq/2020/Feb/30"
} ,
{
"refsource" : "DEBIAN" ,
"name" : "DSA-4629" ,
"url" : "https://www.debian.org/security/2020/dsa-4629"
2020-02-24 17:01:08 +00:00
} ,
{
"refsource" : "CONFIRM" ,
"name" : "https://security.netapp.com/advisory/ntap-20200221-0006/" ,
"url" : "https://security.netapp.com/advisory/ntap-20200221-0006/"
2020-05-01 02:01:11 +00:00
} ,
{
"refsource" : "GENTOO" ,
"name" : "GLSA-202004-17" ,
"url" : "https://security.gentoo.org/glsa/202004-17"
2020-06-19 03:01:23 +00:00
} ,
{
"refsource" : "FEDORA" ,
"name" : "FEDORA-2020-c2639662af" ,
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4A2AP4T7RKPBCLTI2NNQG3T6MINDUUMZ/"
2020-01-21 17:01:08 +00:00
}
]
}
}