diff options
author | Wen Heping <wen@FreeBSD.org> | 2020-03-12 01:31:29 +0000 |
---|---|---|
committer | Wen Heping <wen@FreeBSD.org> | 2020-03-12 01:31:29 +0000 |
commit | 32e28c78f520998e66364b27263e9b60fb3e1216 (patch) | |
tree | 6bda5ea8e6631e2affe3c410c99346dc9cac6b40 /security | |
parent | ada558d1001257ab7ebc4b22c7a43609d9bc25fb (diff) | |
download | ports-32e28c78f520998e66364b27263e9b60fb3e1216.tar.gz ports-32e28c78f520998e66364b27263e9b60fb3e1216.zip |
Notes
Diffstat (limited to 'security')
-rw-r--r-- | security/vuxml/vuln.xml | 48 |
1 files changed, 48 insertions, 0 deletions
diff --git a/security/vuxml/vuln.xml b/security/vuxml/vuln.xml index e1ab51741737..e25c952ca429 100644 --- a/security/vuxml/vuln.xml +++ b/security/vuxml/vuln.xml @@ -58,6 +58,54 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="1685144e-63ff-11ea-a93a-080027846a02"> + <topic>Django -- potential SQL injection vulnerability</topic> + <affects> + <package> + <name>py27-django111</name> + <name>py35-django111</name> + <name>py36-django111</name> + <name>py37-django111</name> + <name>py38-django111</name> + <range><lt>1.11.29</lt></range> + </package> + <package> + <name>py35-django22</name> + <name>py36-django22</name> + <name>py37-django22</name> + <name>py38-django22</name> + <range><lt>2.2.11</lt></range> + </package> + <package> + <name>py36-django30</name> + <name>py37-django30</name> + <name>py38-django30</name> + <range><lt>3.0.4</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>MITRE CVE reports:</p> + <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402"> + <p>Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 + allows SQL Injection if untrusted data is used as a tolerance parameter + in GIS functions and aggregates on Oracle. By passing a suitably crafted + tolerance to GIS functions and aggregates on Oracle, it was possible to + break escaping and inject malicious SQL.</p> + </blockquote> + </body> + </description> + <references> + <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9402</url> + <url>https://www.djangoproject.com/weblog/2020/mar/04/security-releases/</url> + <cvename>CVE-2020-9402</cvename> + </references> + <dates> + <discovery>2020-02-25</discovery> + <entry>2020-03-12</entry> + </dates> + </vuln> + <vuln vid="1afe9552-5ee3-11ea-9b6d-901b0e934d69"> <topic>py-matrix-synapse -- users of single-sign-on are vulnerable to phishing</topic> <affects> |