Rapid7 Vulnerability & Exploit Database

Oracle Solaris 11: CVE-2020-9402: Vulnerability in Django

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

Oracle Solaris 11: CVE-2020-9402: Vulnerability in Django

Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
03/05/2020
Created
01/20/2021
Added
01/19/2021
Modified
02/17/2022

Description

Django 1.11 before 1.11.29, 2.2 before 2.2.11, and 3.0 before 3.0.4 allows SQL Injection if untrusted data is used as a tolerance parameter in GIS functions and aggregates on Oracle. By passing a suitably crafted tolerance to GIS functions and aggregates on Oracle, it was possible to break escaping and inject malicious SQL.

Solution(s)

  • oracle-solaris-11-4-upgrade-legacy-library-python-django-27-1-11-29-11-4-21-0-1-69-0
  • oracle-solaris-11-4-upgrade-legacy-library-python-django-34-1-11-29-11-4-21-0-1-69-0
  • oracle-solaris-11-4-upgrade-legacy-library-python-django-35-1-11-29-11-4-21-0-1-69-0
  • oracle-solaris-11-4-upgrade-library-python-2-django-1-4-10-11-4-0-0-1-9-0
  • oracle-solaris-11-4-upgrade-library-python-2-django-26-1-4-22-11-4-0-0-0-13-0
  • oracle-solaris-11-4-upgrade-library-python-2-django-27-1-4-10-11-4-0-0-1-9-0
  • oracle-solaris-11-4-upgrade-library-python-django-1-11-29-11-4-21-0-1-69-0
  • oracle-solaris-11-4-upgrade-library-python-django-26-1-4-22-11-4-0-0-1-9-0
  • oracle-solaris-11-4-upgrade-library-python-django-27-1-11-29-11-4-21-0-1-69-0
  • oracle-solaris-11-4-upgrade-library-python-django-34-1-11-29-11-4-21-0-1-69-0
  • oracle-solaris-11-4-upgrade-library-python-django-35-1-11-29-11-4-21-0-1-69-0
  • oracle-solaris-11-4-upgrade-library-python-django-37-1-11-29-11-4-21-0-1-69-0

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;