First published: Wed Apr 06 2022(Updated: )
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
pip/Django | >=4.0<4.0.4 | 4.0.4 |
pip/Django | >=3.2<3.2.13 | 3.2.13 |
pip/Django | >=2.2<2.2.28 | 2.2.28 |
redhat/Django | <4.0.4 | 4.0.4 |
redhat/Django | <3.2.13 | 3.2.13 |
redhat/Django | <2.2.28 | 2.2.28 |
redhat/automation-controller | <0:4.1.2-2.el8a | 0:4.1.2-2.el8a |
redhat/python-django | <0:3.2.13-1.el8 | 0:3.2.13-1.el8 |
redhat/python3-django | <0:2.2.28-1.el7 | 0:2.2.28-1.el7 |
redhat/python3-django | <0:2.2.28-1.el8 | 0:2.2.28-1.el8 |
redhat/python-django | <0:3.2.13-2.el8 | 0:3.2.13-2.el8 |
redhat/python-pulpcore | <0:3.17.6-3.el8 | 0:3.17.6-3.el8 |
Djangoproject Django | >=2.2<2.2.28 | |
Djangoproject Django | >=3.2<3.2.13 | |
Djangoproject Django | >=4.0<4.0.4 | |
Debian Debian Linux | =11.0 | |
debian/python-django | 1:1.11.29-1~deb10u1 1:1.11.29-1+deb10u10 2:2.2.28-1~deb11u2 3:3.2.19-1+deb12u1 3:3.2.21-1 3:4.2.8-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2022-28347 is a SQL injection vulnerability in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4.
CVE-2022-28347 has a severity rating of 9.8 (Critical).
Django versions 2.2 to 2.2.28, 3.2 to 3.2.13, and 4.0 to 4.0.4 are affected by CVE-2022-28347.
To fix CVE-2022-28347, update Django to version 2.2.28, 3.2.13, or 4.0.4.
You can find more information about CVE-2022-28347 at the following sources: [CVE website](https://www.cve.org/CVERecord?id=CVE-2022-28347), [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-28347), [Django security releases](https://www.djangoproject.com/weblog/2022/apr/11/security-releases/), [Red Hat Bugzilla](https://bugzilla.redhat.com/show_bug.cgi?id=2072459), and [Red Hat Advisory](https://access.redhat.com/errata/RHSA-2022:5702).