You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A Potential SQL injection was found in Django 4.2.x prior to 4.2.17, 5.0.x prior to 5.0.10 and 5.1.x prior to 5.1.4. Direct usage of the django.db.models.fields.json.HasKey lookup on Oracle is subject to SQL injection if untrusted data is used as a lhs value. Applications that use the jsonfield.has_key lookup through the __ syntax are unaffected.
A Potential denial-of-service vulnerability was discovered in django.utils.html.strip_tags() in Django 4.2.x prior to 4.2.17, 5.0.x prior to 5.0.10 and 5.1.x prior to 5.1.4.
The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities.
mend-bolt-for-githubbot
changed the title
Django-4.2.16-py3-none-any.whl: 2 vulnerabilities (highest severity is: 7.3)
Django-4.2.16-py3-none-any.whl: 2 vulnerabilities (highest severity is: 9.8)
Dec 7, 2024
mend-bolt-for-githubbot
changed the title
Django-4.2.16-py3-none-any.whl: 2 vulnerabilities (highest severity is: 9.8)
Django-4.2.16-py3-none-any.whl: 3 vulnerabilities (highest severity is: 9.8)
Jan 14, 2025
Vulnerable Library - Django-4.2.16-py3-none-any.whl
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
Library home page: https://files.pythonhosted.org/packages/94/2c/6b6c7e493d5ea789416918658ebfa16be7a64c77610307497ed09a93c8c4/Django-4.2.16-py3-none-any.whl
Path to dependency file: /server/requirements.txt
Path to vulnerable library: /server/requirements.txt
Found in HEAD commit: 8233eb35f209c5b712ecc7d96645a2de905e8282
Vulnerabilities
**In some cases, Remediation PR cannot be created automatically for a vulnerability despite the availability of remediation
Details
CVE-2024-53908
Vulnerable Library - Django-4.2.16-py3-none-any.whl
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
Library home page: https://files.pythonhosted.org/packages/94/2c/6b6c7e493d5ea789416918658ebfa16be7a64c77610307497ed09a93c8c4/Django-4.2.16-py3-none-any.whl
Path to dependency file: /server/requirements.txt
Path to vulnerable library: /server/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 8233eb35f209c5b712ecc7d96645a2de905e8282
Found in base branch: main
Vulnerability Details
A Potential SQL injection was found in Django 4.2.x prior to 4.2.17, 5.0.x prior to 5.0.10 and 5.1.x prior to 5.1.4. Direct usage of the django.db.models.fields.json.HasKey lookup on Oracle is subject to SQL injection if untrusted data is used as a lhs value. Applications that use the jsonfield.has_key lookup through the __ syntax are unaffected.
Publish Date: 2024-12-06
URL: CVE-2024-53908
CVSS 3 Score Details (9.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.djangoproject.com/weblog/2024/dec/04/security-releases/
Release Date: 2024-12-06
Fix Resolution: 4.2.17
Step up your Open Source Security Game with Mend here
CVE-2024-53907
Vulnerable Library - Django-4.2.16-py3-none-any.whl
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
Library home page: https://files.pythonhosted.org/packages/94/2c/6b6c7e493d5ea789416918658ebfa16be7a64c77610307497ed09a93c8c4/Django-4.2.16-py3-none-any.whl
Path to dependency file: /server/requirements.txt
Path to vulnerable library: /server/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 8233eb35f209c5b712ecc7d96645a2de905e8282
Found in base branch: main
Vulnerability Details
A Potential denial-of-service vulnerability was discovered in django.utils.html.strip_tags() in Django 4.2.x prior to 4.2.17, 5.0.x prior to 5.0.10 and 5.1.x prior to 5.1.4.
The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities.
Publish Date: 2024-12-06
URL: CVE-2024-53907
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://www.djangoproject.com/weblog/2024/dec/04/security-releases/
Release Date: 2024-12-06
Fix Resolution: 4.2.17
Step up your Open Source Security Game with Mend here
CVE-2024-56374
Vulnerable Library - Django-4.2.16-py3-none-any.whl
A high-level Python web framework that encourages rapid development and clean, pragmatic design.
Library home page: https://files.pythonhosted.org/packages/94/2c/6b6c7e493d5ea789416918658ebfa16be7a64c77610307497ed09a93c8c4/Django-4.2.16-py3-none-any.whl
Path to dependency file: /server/requirements.txt
Path to vulnerable library: /server/requirements.txt
Dependency Hierarchy:
Found in HEAD commit: 8233eb35f209c5b712ecc7d96645a2de905e8282
Found in base branch: main
Vulnerability Details
Django: Potential denial-of-service vulnerability in IPv6 validation
Publish Date: 2025-01-14
URL: CVE-2024-56374
CVSS 3 Score Details (5.8)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://seclists.org/oss-sec/2025/q1/15
Release Date: 2025-01-13
Fix Resolution: Django - 4.2.18,5.0.11,5.1.5
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: