MGASA-2022-0281

Source
https://advisories.mageia.org/MGASA-2022-0281.html
Import Source
https://advisories.mageia.org/MGASA-2022-0281.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2022-0281
Related
Published
2022-08-13T02:32:35Z
Modified
2022-08-13T01:12:54Z
Summary
Updated python-django packages fix security vulnerability
Details

An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected. (CVE-2022-34265) An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input. (CVE-2022-36359)

References
Credits

Affected packages

Mageia:8 / python-django

Package

Name
python-django
Purl
pkg:rpm/mageia/python-django?distro=mageia-8

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.2.15-1.mga8

Ecosystem specific

{
    "section": "core"
}