An issue was discovered in Django 1.11.x before 1.11.23, 2.1.x before 2.1.11, and 2.2.x before 2.2.4. Due to an error in shallow key transformation, key and index lookups for django.contrib.postgres.fields.JSONField, and key lookups for django.contrib.postgres.fields.HStoreField, were subject to SQL injection. This could, for example, be exploited via crafted use of "OR 1=1" in a key or index name to return all records, using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to the QuerySet.filter() function.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
07 Nov 2023, 03:04
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-08-09 13:15
Updated : 2024-02-28 17:08
NVD link : CVE-2019-14234
Mitre link : CVE-2019-14234
CVE.ORG link : CVE-2019-14234
JSON object : View
Products Affected
fedoraproject
- fedora
djangoproject
- django
debian
- debian_linux
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')