Watemlifts / wagtail

A Django content management system focused on flexibility and user experience
https://wagtail.io
BSD 3-Clause "New" or "Revised" License
1 stars 0 forks source link

CVE-2022-28347 (Critical) detected in Django-2.2.4.tar.gz #191

Open mend-bolt-for-github[bot] opened 2 years ago

mend-bolt-for-github[bot] commented 2 years ago

CVE-2022-28347 - Critical Severity Vulnerability

Vulnerable Library - Django-2.2.4.tar.gz

A high-level Python Web framework that encourages rapid development and clean, pragmatic design.

Library home page: https://files.pythonhosted.org/packages/19/11/3449a2071df9427e7a5c4dddee2462e88840dd968a9b0c161097154fcb0c/Django-2.2.4.tar.gz

Path to dependency file: /wagtail/wagtail/project_template/requirements.txt

Path to vulnerable library: /teSource-ArchiveExtractor_6a8a4d3e-1a25-411e-895f-d18400c71569/20190823195740_81768/20190823195722_depth_0/1/Django-2.2.4.tar/Django-2.2.4

Dependency Hierarchy: - :x: **Django-2.2.4.tar.gz** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.

Publish Date: 2022-04-12

URL: CVE-2022-28347

CVSS 3 Score Details (9.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28347

Release Date: 2022-04-12

Fix Resolution: 2.2.28


Step up your Open Source Security Game with Mend here