CVE-2020-7471
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.
Django versiones 1.11 anteriores a 1.11.28, versiones 2.2 anteriores a 2.2.10 y versiones 3.0 anteriores a 3.0.3, permite una Inyección SQL si se usan datos no confiables como un delimitador de StringAgg (por ejemplo, en aplicaciones Django que ofrecen descargas de datos como una serie de filas con un delimitador de columna especificado por el usuario). Al pasar un delimitador apropiadamente diseñado a una instancia contrib.postgres.aggregates.StringAgg, fue posible romper el escape e inyectar SQL malicioso.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-21 CVE Reserved
- 2020-02-03 CVE Published
- 2020-02-13 First Exploit
- 2024-05-29 EPSS Updated
- 2024-08-04 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2020/02/03/1 | Mailing List | |
https://groups.google.com/forum/#%21topic/django-announce/X45S86X5bZI | X_refsource_confirm | |
https://seclists.org/bugtraq/2020/Feb/30 | Mailing List | |
https://security.netapp.com/advisory/ntap-20200221-0006 | X_refsource_confirm | |
https://www.openwall.com/lists/oss-security/2020/02/03/1 | Mailing List |
URL | Date | SRC |
---|---|---|
https://github.com/Saferman/CVE-2020-7471 | 2020-02-13 | |
https://github.com/SNCKER/CVE-2020-7471 | 2020-02-22 | |
https://github.com/mrlihd/CVE-2020-7471 | 2021-09-01 | |
https://github.com/huzaifakhan771/CVE-2020-7471-Django | 2021-06-03 |
URL | Date | SRC |
---|---|---|
https://github.com/django/django/commit/eb31d845323618d688ad429479c6dda973056136 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Djangoproject Search vendor "Djangoproject" | Django Search vendor "Djangoproject" for product "Django" | >= 1.11 < 1.11.28 Search vendor "Djangoproject" for product "Django" and version " >= 1.11 < 1.11.28" | - |
Affected
| ||||||
Djangoproject Search vendor "Djangoproject" | Django Search vendor "Djangoproject" for product "Django" | >= 2.2 < 2.2.10 Search vendor "Djangoproject" for product "Django" and version " >= 2.2 < 2.2.10" | - |
Affected
| ||||||
Djangoproject Search vendor "Djangoproject" | Django Search vendor "Djangoproject" for product "Django" | >= 3.0 < 3.0.3 Search vendor "Djangoproject" for product "Django" and version " >= 3.0 < 3.0.3" | - |
Affected
|