First published: Fri Aug 02 2024(Updated: )
Description: QuerySet.values() and QuerySet.values_list() methods on models with a JSONField were subject to SQL injection in column aliases, via a crafted JSON object key as a passed *arg. Affected versions ================= * Django main development branch * Django 5.1 (currently at release candidate status) * Django 5.0 * Django 4.2
Affected Software | Affected Version | How to fix |
---|---|---|
Django | >4.2<=5.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2302436 is considered high due to its potential for SQL injection vulnerabilities.
To fix REDHAT-BUG-2302436, update your Django version to a patched release above 5.1.
Django main development branch and all versions from 4.2 up to 5.1 are affected by REDHAT-BUG-2302436.
The symptoms of REDHAT-BUG-2302436 include possible unexpected SQL execution or data leaks when using QuerySet.values() and values_list() with a JSONField.
Yes, REDHAT-BUG-2302436 represents a common vulnerability that arises from the misuse of dynamic SQL in web applications.