Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-pghf-347x-c2gj

Опубликовано: 16 апр. 2021
Источник: github
Github: Прошло ревью
CVSS4: 7.2
CVSS3: 9.8

Описание

SQL Injection via in django-debug-toolbar

Impact

With Django Debug Toolbar attackers are able to execute SQL by changing the raw_sql input of the SQL explain, analyze or select forms and submitting the form.

NOTE: This is a high severity issue for anyone using the toolbar in a production environment.

Generally the Django Debug Toolbar team only maintains the latest version of django-debug-toolbar, but an exception was made because of the high severity of this issue.

Patches

Please upgrade to one of the following versions, depending on the major version you're using:

For more information

If you have any questions or comments about this advisory:

Пакеты

Наименование

django-debug-toolbar

pip
Затронутые версииВерсия исправления

>= 0.10.0, < 1.11.1

1.11.1

Наименование

django-debug-toolbar

pip
Затронутые версииВерсия исправления

>= 2.0a1, < 2.2.1

2.2.1

Наименование

django-debug-toolbar

pip
Затронутые версииВерсия исправления

>= 3.0a1, < 3.2.1

3.2.1

EPSS

Процентиль: 62%
0.00434
Низкий

7.2 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-89

Связанные уязвимости

CVSS3: 9.8
nvd
почти 5 лет назад

A SQL Injection issue in the SQL Panel in Jazzband Django Debug Toolbar before 1.11.1, 2.x before 2.2.1, and 3.x before 3.2.1 allows attackers to execute SQL statements by changing the raw_sql input field of the SQL explain, analyze, or select form.

EPSS

Процентиль: 62%
0.00434
Низкий

7.2 High

CVSS4

9.8 Critical

CVSS3

Дефекты

CWE-89