Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 711624 - dev-python/django: SQL injection (Oracle) on untrusted data in GIS functions (via 'tolerance') (CVE-2020-9402)
Summary: dev-python/django: SQL injection (Oracle) on untrusted data in GIS functions ...
Status: RESOLVED DUPLICATE of bug 711522
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL: https://www.djangoproject.com/weblog/...
Whiteboard: C3 [ebuild]
Keywords:
Depends on:
Blocks:
 
Reported: 2020-03-05 18:30 UTC by Sam James
Modified: 2020-04-08 04:29 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Sam James archtester Gentoo Infrastructure gentoo-dev Security 2020-03-05 18:30:17 UTC
Description:
"Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL."
Comment 1 Agostino Sarubbo gentoo-dev 2020-03-06 07:36:17 UTC

*** This bug has been marked as a duplicate of bug 711522 ***