Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@BruceHaley
Copy link
Contributor

Fixes #1803

Django 1.11 before 1.11.28, 2.2 before 2.2.10, and 3.0 before 3.0.3 allows SQL Injection if untrusted data is used as a StringAgg delimiter (e.g., in Django applications that offer downloads of data as a series of rows with a user-specified column delimiter). By passing a suitably crafted delimiter to a contrib.postgres.aggregates.StringAgg instance, it was possible to break escaping and inject malicious SQL.

https://dev.azure.com/FuseLabs/SDK_v4/_componentGovernance/112465/alert/2370216?typeId=4354877

Fix version spec in setup.py

@mrivera-ms mrivera-ms merged commit 26e7902 into main Sep 27, 2021
@mrivera-ms mrivera-ms deleted the bruce/djangovulnerabilityfix9-23 branch September 27, 2021 21:52
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Django Component Governance vulnerability

3 participants