Skip to content

Commit 0d71b9b

Browse files
1 parent 6f1b17b commit 0d71b9b

File tree

4 files changed

+246
-88
lines changed

4 files changed

+246
-88
lines changed
Lines changed: 123 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,123 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-frmv-pr5f-9mcr",
4+
"modified": "2025-11-05T19:55:43Z",
5+
"published": "2025-11-05T15:31:07Z",
6+
"aliases": [
7+
"CVE-2025-64459"
8+
],
9+
"summary": "Django vulnerable to SQL injection via _connector keyword argument in QuerySet and Q objects.",
10+
"details": "An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.\nThe methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank cyberstan for reporting this issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "django"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "5.2a1"
29+
},
30+
{
31+
"fixed": "5.2.8"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "PyPI",
40+
"name": "django"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "5.0a1"
48+
},
49+
{
50+
"fixed": "5.1.14"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "PyPI",
59+
"name": "django"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "0"
67+
},
68+
{
69+
"fixed": "4.2.26"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "ADVISORY",
79+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64459"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/django/django/commit/06dd38324ac3d60d83d9f3adabf0dcdf423d2a85"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://github.com/django/django/commit/59ae82e67053d281ff4562a24bbba21299f0a7d4"
88+
},
89+
{
90+
"type": "WEB",
91+
"url": "https://github.com/django/django/commit/6703f364d767e949c5b0e4016433ef75063b4f9b"
92+
},
93+
{
94+
"type": "WEB",
95+
"url": "https://github.com/django/django/commit/72d2c87431f2ae0431d65d0ec792047f078c8241"
96+
},
97+
{
98+
"type": "WEB",
99+
"url": "https://docs.djangoproject.com/en/dev/releases/security"
100+
},
101+
{
102+
"type": "PACKAGE",
103+
"url": "https://github.com/django/django"
104+
},
105+
{
106+
"type": "WEB",
107+
"url": "https://groups.google.com/g/django-announce"
108+
},
109+
{
110+
"type": "WEB",
111+
"url": "https://www.djangoproject.com/weblog/2025/nov/05/security-releases"
112+
}
113+
],
114+
"database_specific": {
115+
"cwe_ids": [
116+
"CWE-89"
117+
],
118+
"severity": "CRITICAL",
119+
"github_reviewed": true,
120+
"github_reviewed_at": "2025-11-05T19:55:43Z",
121+
"nvd_published_at": "2025-11-05T15:15:41Z"
122+
}
123+
}
Lines changed: 123 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,123 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-qw25-v68c-qjf3",
4+
"modified": "2025-11-05T19:55:37Z",
5+
"published": "2025-11-05T15:31:07Z",
6+
"aliases": [
7+
"CVE-2025-64458"
8+
],
9+
"summary": "Django has a denial-of-service vulnerability in HttpResponseRedirect and HttpResponsePermanentRedirect on Windows",
10+
"details": "An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.\nNFKC normalization in Python is slow on Windows. As a consequence, `django.http.HttpResponseRedirect`, `django.http.HttpResponsePermanentRedirect`, and the shortcut `django.shortcuts.redirect` were subject to a potential denial-of-service attack via certain inputs with a very large number of Unicode characters.\nEarlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.\nDjango would like to thank Seokchan Yoon for reporting this issue.",
11+
"severity": [
12+
{
13+
"type": "CVSS_V3",
14+
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"
15+
}
16+
],
17+
"affected": [
18+
{
19+
"package": {
20+
"ecosystem": "PyPI",
21+
"name": "django"
22+
},
23+
"ranges": [
24+
{
25+
"type": "ECOSYSTEM",
26+
"events": [
27+
{
28+
"introduced": "5.2a1"
29+
},
30+
{
31+
"fixed": "5.2.8"
32+
}
33+
]
34+
}
35+
]
36+
},
37+
{
38+
"package": {
39+
"ecosystem": "PyPI",
40+
"name": "django"
41+
},
42+
"ranges": [
43+
{
44+
"type": "ECOSYSTEM",
45+
"events": [
46+
{
47+
"introduced": "5.0a1"
48+
},
49+
{
50+
"fixed": "5.1.14"
51+
}
52+
]
53+
}
54+
]
55+
},
56+
{
57+
"package": {
58+
"ecosystem": "PyPI",
59+
"name": "django"
60+
},
61+
"ranges": [
62+
{
63+
"type": "ECOSYSTEM",
64+
"events": [
65+
{
66+
"introduced": "0"
67+
},
68+
{
69+
"fixed": "4.2.26"
70+
}
71+
]
72+
}
73+
]
74+
}
75+
],
76+
"references": [
77+
{
78+
"type": "ADVISORY",
79+
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-64458"
80+
},
81+
{
82+
"type": "WEB",
83+
"url": "https://github.com/django/django/commit/3790593781d26168e7306b5b2f8ea0309de16242"
84+
},
85+
{
86+
"type": "WEB",
87+
"url": "https://github.com/django/django/commit/4f5d904b63751dea9ffc3b0e046404a7fa5881ac"
88+
},
89+
{
90+
"type": "WEB",
91+
"url": "https://github.com/django/django/commit/6e13348436fccf8f22982921d6a3a3e65c956a9f"
92+
},
93+
{
94+
"type": "WEB",
95+
"url": "https://github.com/django/django/commit/770eea38d7a0e9ba9455140b5a9a9e33618226a7"
96+
},
97+
{
98+
"type": "WEB",
99+
"url": "https://docs.djangoproject.com/en/dev/releases/security"
100+
},
101+
{
102+
"type": "PACKAGE",
103+
"url": "https://github.com/django/django"
104+
},
105+
{
106+
"type": "WEB",
107+
"url": "https://groups.google.com/g/django-announce"
108+
},
109+
{
110+
"type": "WEB",
111+
"url": "https://www.djangoproject.com/weblog/2025/nov/05/security-releases"
112+
}
113+
],
114+
"database_specific": {
115+
"cwe_ids": [
116+
"CWE-407"
117+
],
118+
"severity": "HIGH",
119+
"github_reviewed": true,
120+
"github_reviewed_at": "2025-11-05T19:55:37Z",
121+
"nvd_published_at": "2025-11-05T15:15:40Z"
122+
}
123+
}

advisories/unreviewed/2025/11/GHSA-frmv-pr5f-9mcr/GHSA-frmv-pr5f-9mcr.json

Lines changed: 0 additions & 44 deletions
This file was deleted.

advisories/unreviewed/2025/11/GHSA-qw25-v68c-qjf3/GHSA-qw25-v68c-qjf3.json

Lines changed: 0 additions & 44 deletions
This file was deleted.

0 commit comments

Comments
 (0)