Safety vulnerability ID: 40899
The information on this page was manually curated by our Cybersecurity Intelligence Team.
[This advisory has been limited. Please create a free account to view the full advisory.]
Latest version: 6.0
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
[This affected versions has been limited. Please create a free account to view the full affected versions.]
[This fixed versions has been limited. Please create a free account to view the full fixed versions.]
Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application. See CVE-2021-35042.
CONFIRM:https://www.djangoproject.com/weblog/2021/jul/01/security-releases/: https://www.djangoproject.com/weblog/2021/jul/01/security-releases/
CONFIRM:https://www.openwall.com/lists/oss-security/2021/07/02/2: https://www.openwall.com/lists/oss-security/2021/07/02/2
MISC:https://docs.djangoproject.com/en/3.2/releases/security/: https://docs.djangoproject.com/en/3.2/releases/security/
MISC:https://groups.google.com/forum/#!forum/django-announce: https://groups.google.com/forum/#%21forum/django-announce
Scan your Python project for dependency vulnerabilities in two minutes
Scan your application