Safety vulnerability ID: 40899
The information on this page was manually curated by our Cybersecurity Intelligence Team.
Django versions 3.1.13 and 3.2.5 include a fix for CVE-2021-35042: Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
https://www.djangoproject.com/weblog/2021/jul/01/security-releases/
https://www.openwall.com/lists/oss-security/2021/07/02/2
https://docs.djangoproject.com/en/3.2/releases/security/
https://groups.google.com/forum/#%21forum/django-announce
Latest version: 5.1.3
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. See CVE-2021-35042.
CONFIRM:https://www.djangoproject.com/weblog/2021/jul/01/security-releases/: https://www.djangoproject.com/weblog/2021/jul/01/security-releases/
CONFIRM:https://www.openwall.com/lists/oss-security/2021/07/02/2: https://www.openwall.com/lists/oss-security/2021/07/02/2
MISC:https://docs.djangoproject.com/en/3.2/releases/security/: https://docs.djangoproject.com/en/3.2/releases/security/
MISC:https://groups.google.com/forum/#!forum/django-announce: https://groups.google.com/forum/#%21forum/django-announce
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application