First published: Wed Dec 07 2022(Updated: )
Security Fix(es):<br><li> SQL injection in QuerySet.annotate() aggregate() and extra()</li> (CVE-2022-28346)<br><li> Possible XSS via '{% debug %}' template tag (CVE-2022-22818)</li> <li> Denial of service possibility in file uploads (CVE-2022-23833)</li> For more details about the security issue(s), including the impact, a CVSS<br>score, acknowledgments, and other related information, refer to the CVE<br>page listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/python-django20 | <2.0.13-18.el8 | 2.0.13-18.el8 |
redhat/python-django20-bash-completion | <2.0.13-18.el8 | 2.0.13-18.el8 |
redhat/python3-django20 | <2.0.13-18.el8 | 2.0.13-18.el8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:8872 is high due to multiple vulnerabilities including SQL injection and XSS.
To fix RHSA-2022:8872, upgrade to the patched version 2.0.13-18.el8 of the affected Django packages.
RHSA-2022:8872 addresses SQL injection, possible XSS, and denial of service vulnerabilities.
RHSA-2022:8872 affects the python-django20, python-django20-bash-completion, and python3-django20 packages.
The specific CVEs associated with RHSA-2022:8872 are CVE-2022-28346, CVE-2022-22818, and CVE-2022-23833.