mirror of
https://github.com/django/django.git
synced 2025-10-24 22:26:08 +00:00
Fixed CVE-2019-14234 -- Protected JSONField/HStoreField key and index lookups against SQL injection.
Thanks to Sage M. Abdullah for the report and initial patch. Thanks Florian Apolloner for reviews.
This commit is contained in:
committed by
Carlton Gibson
parent
4b78420d25
commit
7deeabc7c7
@@ -36,3 +36,12 @@ Remember that absolutely NO guarantee is provided about the results of
|
||||
``strip_tags()`` being HTML safe. So NEVER mark safe the result of a
|
||||
``strip_tags()`` call without escaping it first, for example with
|
||||
:func:`django.utils.html.escape`.
|
||||
|
||||
CVE-2019-14234: SQL injection possibility in key and index lookups for ``JSONField``/``HStoreField``
|
||||
====================================================================================================
|
||||
|
||||
:lookup:`Key and index lookups <jsonfield.key>` for
|
||||
:class:`~django.contrib.postgres.fields.JSONField` and :lookup:`key lookups
|
||||
<hstorefield.key>` for :class:`~django.contrib.postgres.fields.HStoreField`
|
||||
were subject to SQL injection, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to ``QuerySet.filter()``.
|
||||
|
||||
@@ -36,3 +36,12 @@ Remember that absolutely NO guarantee is provided about the results of
|
||||
``strip_tags()`` being HTML safe. So NEVER mark safe the result of a
|
||||
``strip_tags()`` call without escaping it first, for example with
|
||||
:func:`django.utils.html.escape`.
|
||||
|
||||
CVE-2019-14234: SQL injection possibility in key and index lookups for ``JSONField``/``HStoreField``
|
||||
====================================================================================================
|
||||
|
||||
:lookup:`Key and index lookups <jsonfield.key>` for
|
||||
:class:`~django.contrib.postgres.fields.JSONField` and :lookup:`key lookups
|
||||
<hstorefield.key>` for :class:`~django.contrib.postgres.fields.HStoreField`
|
||||
were subject to SQL injection, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to ``QuerySet.filter()``.
|
||||
|
||||
@@ -37,6 +37,15 @@ Remember that absolutely NO guarantee is provided about the results of
|
||||
``strip_tags()`` call without escaping it first, for example with
|
||||
:func:`django.utils.html.escape`.
|
||||
|
||||
CVE-2019-14234: SQL injection possibility in key and index lookups for ``JSONField``/``HStoreField``
|
||||
====================================================================================================
|
||||
|
||||
:lookup:`Key and index lookups <jsonfield.key>` for
|
||||
:class:`~django.contrib.postgres.fields.JSONField` and :lookup:`key lookups
|
||||
<hstorefield.key>` for :class:`~django.contrib.postgres.fields.HStoreField`
|
||||
were subject to SQL injection, using a suitably crafted dictionary, with
|
||||
dictionary expansion, as the ``**kwargs`` passed to ``QuerySet.filter()``.
|
||||
|
||||
Bugfixes
|
||||
========
|
||||
|
||||
|
||||
Reference in New Issue
Block a user