CVE-2020-7471

Priority
Description
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows
SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in
Django applications that offer downloads of data as a series of rows with a
user-specified column delimiter). By passing a suitably crafted delimiter
to a contrib.postgres.aggregates.StringAgg instance, it was possible to
break escaping and inject malicious SQL.
Assigned-to
amurray
Notes
Package
Upstream:released (2.2.10)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):not-affected (code not present)
Ubuntu 16.04 LTS (Xenial Xerus):not-affected (code not present)
Ubuntu 18.04 LTS (Bionic Beaver):released (1:1.11.11-1ubuntu1.7)
Ubuntu 19.10 (Eoan Ermine):released (1:1.11.22-1ubuntu1.2)
Ubuntu 20.04 (Focal Fossa):not-affected (2:2.2.10-1)
Patches:
Upstream:https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136 (master)
Upstream:https://github.com/django/django/commit/505826b469b16ab36693360da9e11fd13213421b (3.0)
Upstream:https://github.com/django/django/commit/c67a368c16e4680b324b4f385398d638db4d8147 (2.2)
Upstream:https://github.com/django/django/commit/001b0634cd309e372edb6d7d95d083d02b8e37bd (1.1)
More Information

Updated: 2020-02-07 16:15:48 UTC (commit 5c1a98c2bc5206494b5a03c7f0c50bfa3ece9c08)