Date: Thu, 12 Mar 2020 01:31:29 +0000 (UTC) From: Wen Heping <wen@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r528265 - head/security/vuxml Message-ID: <202003120131.02C1VTRJ079556@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: wen Date: Thu Mar 12 01:31:29 2020 New Revision: 528265 URL: https://svnweb.freebsd.org/changeset/ports/528265 Log: - Document django's potential SQL injection vulnerability Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Thu Mar 12 01:19:31 2020 (r528264) +++ head/security/vuxml/vuln.xml Thu Mar 12 01:31:29 2020 (r528265) @@ -58,6 +58,54 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1685144e-63ff-11ea-a93a-080027846a02"> + <topic>Django -- potential SQL injection vulnerability</topic> + <affects> + <package> + <name>py27-django111</name> + <name>py35-django111</name> + <name>py36-django111</name> + <name>py37-django111</name> + <name>py38-django111</name> + <range><lt>1.11.29</lt></range> + </package> + <package> + <name>py35-django22</name> + <name>py36-django22</name> + <name>py37-django22</name> + <name>py38-django22</name> + <range><lt>2.2.11</lt></range> + </package> + <package> + <name>py36-django30</name> + <name>py37-django30</name> + <name>py38-django30</name> + <range><lt>3.0.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>MITRE CVE reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402"> + <p>Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 + allows SQL Injection if untrusted data is used as a tolerance parameter + in GIS functions and aggregates on Oracle. By passing a suitably crafted + tolerance to GIS functions and aggregates on Oracle, it was possible to + break escaping and inject malicious SQL.</p> + </blockquote> + </body> + </description> + <references> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402</url> + <url>https://www.djangoproject.com/weblog/2020/mar/04/security-releases/</url> + <cvename>CVE-2020-9402</cvename> + </references> + <dates> + <discovery>2020-02-25</discovery> + <entry>2020-03-12</entry> + </dates> + </vuln> + <vuln vid="1afe9552-5ee3-11ea-9b6d-901b0e934d69"> <topic>py-matrix-synapse -- users of single-sign-on are vulnerable to phishing</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?202003120131.02C1VTRJ079556>