Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update dependency Django to v2.2.28 [SECURITY] - autoclosed #138

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jul 11, 2024

Mend Renovate

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
Django (source, changelog) ==2.2.9 -> ==2.2.28 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2021-28658

In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.

CVE-2021-31542

In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.

CVE-2021-32052

In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.

CVE-2021-44420

In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths. This issue has low severity, according to the Django security policy.

CVE-2021-45115

An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. UserAttributeSimilarityValidator incurred significant overhead in evaluating a submitted password that was artificially large in relation to the comparison values. In a situation where access to user registration was unrestricted, this provided a potential vector for a denial-of-service attack.

CVE-2021-45116

An issue was discovered in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1. Due to leveraging the Django Template Language's variable resolution logic, the dictsort template filter was potentially vulnerable to information disclosure, or an unintended method call, if passed a suitably crafted key.

CVE-2022-28347

A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.

CVE-2022-28346

An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.

CVE-2022-23833

An issue was discovered in MultiPartParser in Django 2.2 before 2.2.27, 3.2 before 3.2.12, and 4.0 before 4.0.2. Passing certain inputs to multipart forms could result in an infinite loop when parsing files.

CVE-2021-45452

Storage.save in Django 2.2 before 2.2.26, 3.2 before 3.2.11, and 4.0 before 4.0.1 allows directory traversal if crafted filenames are directly passed to it.


Release Notes

django/django (Django)

v2.2.28

Compare Source

v2.2.27

Compare Source

v2.2.26

Compare Source

v2.2.25

Compare Source

v2.2.24

Compare Source

v2.2.23

Compare Source

v2.2.22

Compare Source

v2.2.21

Compare Source

v2.2.20

Compare Source

v2.2.19

Compare Source

v2.2.18

Compare Source

v2.2.17

Compare Source

v2.2.16

Compare Source

v2.2.15

Compare Source

v2.2.14

Compare Source

v2.2.13

Compare Source

v2.2.12

Compare Source

v2.2.11

Compare Source

v2.2.10

Compare Source


Configuration

📅 Schedule: Branch creation - "" in timezone Europe/London, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from a team as a code owner July 11, 2024 11:15
@renovate renovate bot added the dependencies Pull requests that update a dependency file label Jul 11, 2024
@renovate renovate bot requested review from ciaranca, SalimKainos and Tyler-35 and removed request for a team July 11, 2024 11:15
@renovate renovate bot changed the title Update dependency Django to v2.2.28 [SECURITY] Update dependency Django to v2.2.28 [SECURITY] - autoclosed Jul 11, 2024
@renovate renovate bot closed this Jul 11, 2024
@renovate renovate bot deleted the renovate/pypi-Django-vulnerability branch July 11, 2024 11:59
@renovate renovate bot changed the title Update dependency Django to v2.2.28 [SECURITY] - autoclosed Update dependency Django to v2.2.28 [SECURITY] Jul 11, 2024
@renovate renovate bot reopened this Jul 11, 2024
@renovate renovate bot restored the renovate/pypi-Django-vulnerability branch July 11, 2024 15:23
@renovate renovate bot force-pushed the renovate/pypi-Django-vulnerability branch from e7f6786 to ecaa77a Compare July 11, 2024 15:23
@renovate renovate bot changed the title Update dependency Django to v2.2.28 [SECURITY] Update dependency Django to v2.2.28 [SECURITY] - autoclosed Jul 11, 2024
@renovate renovate bot closed this Jul 11, 2024
@renovate renovate bot deleted the renovate/pypi-Django-vulnerability branch July 11, 2024 15:27
@renovate renovate bot changed the title Update dependency Django to v2.2.28 [SECURITY] - autoclosed Update dependency Django to v2.2.28 [SECURITY] Jul 17, 2024
@renovate renovate bot reopened this Jul 17, 2024
@renovate renovate bot restored the renovate/pypi-Django-vulnerability branch July 17, 2024 09:58
@renovate renovate bot force-pushed the renovate/pypi-Django-vulnerability branch from ecaa77a to 187c240 Compare July 17, 2024 09:58
@renovate renovate bot changed the title Update dependency Django to v2.2.28 [SECURITY] Update dependency Django to v2.2.28 [SECURITY] - autoclosed Jul 22, 2024
@renovate renovate bot closed this Jul 22, 2024
@renovate renovate bot deleted the renovate/pypi-Django-vulnerability branch July 22, 2024 07:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants