aboutsummaryrefslogtreecommitdiff
path: root/security
diff options
context:
space:
mode:
authorWen Heping <wen@FreeBSD.org>2020-03-12 01:31:29 +0000
committerWen Heping <wen@FreeBSD.org>2020-03-12 01:31:29 +0000
commit32e28c78f520998e66364b27263e9b60fb3e1216 (patch)
tree6bda5ea8e6631e2affe3c410c99346dc9cac6b40 /security
parentada558d1001257ab7ebc4b22c7a43609d9bc25fb (diff)
downloadports-32e28c78f520998e66364b27263e9b60fb3e1216.tar.gz
ports-32e28c78f520998e66364b27263e9b60fb3e1216.zip
Notes
Diffstat (limited to 'security')
-rw-r--r--security/vuxml/vuln.xml48
1 files changed, 48 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml
index e1ab51741737..e25c952ca429 100644
--- a/security/vuxml/vuln.xml
+++ b/security/vuxml/vuln.xml
@@ -58,6 +58,54 @@ Notes:
* Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
-->
<vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+ <vuln vid="1685144e-63ff-11ea-a93a-080027846a02">
+ <topic>Django -- potential SQL injection vulnerability</topic>
+ <affects>
+ <package>
+ <name>py27-django111</name>
+ <name>py35-django111</name>
+ <name>py36-django111</name>
+ <name>py37-django111</name>
+ <name>py38-django111</name>
+ <range><lt>1.11.29</lt></range>
+ </package>
+ <package>
+ <name>py35-django22</name>
+ <name>py36-django22</name>
+ <name>py37-django22</name>
+ <name>py38-django22</name>
+ <range><lt>2.2.11</lt></range>
+ </package>
+ <package>
+ <name>py36-django30</name>
+ <name>py37-django30</name>
+ <name>py38-django30</name>
+ <range><lt>3.0.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>MITRE CVE reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402">
+ <p>Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4
+ allows SQL Injection if untrusted data is used as a tolerance parameter
+ in GIS functions and aggregates on Oracle. By passing a suitably crafted
+ tolerance to GIS functions and aggregates on Oracle, it was possible to
+ break escaping and inject malicious SQL.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402</url>
+ <url>https://www.djangoproject.com/weblog/2020/mar/04/security-releases/</url>
+ <cvename>CVE-2020-9402</cvename>
+ </references>
+ <dates>
+ <discovery>2020-02-25</discovery>
+ <entry>2020-03-12</entry>
+ </dates>
+ </vuln>
+
<vuln vid="1afe9552-5ee3-11ea-9b6d-901b0e934d69">
<topic>py-matrix-synapse -- users of single-sign-on are vulnerable to phishing</topic>
<affects>