|
|
Log in / Subscribe / Register

Arch Linux alert ASA-202107-11 (python-django)

From:  Jelle van der Waa via arch-security <arch-security@lists.archlinux.org>
To:  arch-security@lists.archlinux.org
Subject:  [ASA-202107-11] python-django: insufficient validation
Date:  Mon, 05 Jul 2021 21:48:17 +0200
Message-ID:  <78f1ed81-07c6-dded-dcd9-8cb57825701d@archlinux.org>
Cc:  Jelle van der Waa <jelle@archlinux.org>

Arch Linux Security Advisory ASA-202107-11 ========================================== Severity: High Date : 2021-07-03 CVE-ID : CVE-2021-35042 Package : python-django Type : insufficient validation Remote : Yes Link : https://security.archlinux.org/AVG-2123 Summary ======= The package python-django before version 3.2.5-1 is vulnerable to insufficient validation. Resolution ========== Upgrade to 3.2.5-1. # pacman -Syu "python-django>=3.2.5-1" The problem has been fixed upstream in version 3.2.5. Workaround ========== None. Description =========== A security issue has been found in Django before version 3.2.5. Unsanitized user input passed to QuerySet.order_by() could bypass intended column reference validation in path marked for deprecation resulting in a potential SQL injection even if a deprecation warning is emitted. As a mitigation the strict column reference validation was restored for the duration of the deprecation period. Impact ====== A remote attacker is able to perform a SQL injection via unsanitized user input passed to QuerySet.order_by(). References ========== https://docs.djangoproject.com/en/3.2/releases/3.2.5/#cve... https://github.com/django/django/commit/a34a5f724c5d5adb2... https://security.archlinux.org/CVE-2021-35042


to post comments


Copyright © 2026, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds