vulnerability
Arch Linux: Insufficient validation (CVE-2021-35042)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:N/C:P/I:P/A:P) | Jul 2, 2021 | Jul 11, 2025 | Nov 27, 2025 |
Severity
7
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
Jul 2, 2021
Added
Jul 11, 2025
Modified
Nov 27, 2025
Description
A security issue has been found in Django before version 3.2.5. Unsanitized user input passed to QuerySet.order_by() could bypass intended column reference validation in path marked for deprecation resulting in a potential SQL injection even if a deprecation warning is emitted. As a mitigation the strict column reference validation was restored for the duration of the deprecation period.
Solution
arch-linux-upgrade-latest
References
- CVE-2021-35042
- https://attackerkb.com/topics/CVE-2021-35042
- URL-https://docs.djangoproject.com/en/3.2/releases/security/
- URL-https://groups.google.com/forum/#%21forum/django-announce
- URL-https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/
- URL-https://security.archlinux.org/ASA-202107-11
- URL-https://security.netapp.com/advisory/ntap-20210805-0008/
- URL-https://www.djangoproject.com/weblog/2021/jul/01/security-releases/
- URL-https://www.openwall.com/lists/oss-security/2021/07/02/2
- CWE-89
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.