An update for python-django is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS
Security Advisory
openeuler-security@openeuler.org
openEuler security committee
openEuler-SA-2022-1642
Final
1.0
1.0
2022-05-11
Initial
2022-05-11
2022-05-11
openEuler SA Tool V1.0
2022-05-11
python-django security update
An update for python-django is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
A high-level Python Web framework that encourages rapid development and clean, pragmatic design.
Security Fix(es):
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.(CVE-2022-28346)
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.(CVE-2022-28347)
An update for python-django is now available for openEuler-20.03-LTS-SP1,openEuler-20.03-LTS-SP3 and openEuler-22.03-LTS.
openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.
Critical
python-django
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1642
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-28346
https://www.openeuler.org/en/security/cve/detail.html?id=CVE-2022-28347
https://nvd.nist.gov/vuln/detail/CVE-2022-28346
https://nvd.nist.gov/vuln/detail/CVE-2022-28347
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
python-django-2.2.27-2.oe1.src.rpm
python-django-2.2.27-2.oe1.src.rpm
python-django-2.2.27-2.oe2203.src.rpm
python-django-help-2.2.27-2.oe1.noarch.rpm
python3-Django-2.2.27-2.oe1.noarch.rpm
python-django-help-2.2.27-2.oe1.noarch.rpm
python3-Django-2.2.27-2.oe1.noarch.rpm
python-django-help-2.2.27-2.oe2203.noarch.rpm
python3-Django-2.2.27-2.oe2203.noarch.rpm
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs
2022-05-11
CVE-2022-28346
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Critical
9.8
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
python-django security update
2022-05-11
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1642
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
2022-05-11
CVE-2022-28347
openEuler-20.03-LTS-SP1
openEuler-20.03-LTS-SP3
openEuler-22.03-LTS
Critical
9.8
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
python-django security update
2022-05-11
https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1642