======================================================================

                                 CERT-Renater

                      Note d'Information No. 2024/VULN521
_____________________________________________________________________

DATE                : 06/12/2024

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Django versions prior to 5.1.4,
                                       5.0.10, 4.2.17.

=====================================================================
https://www.djangoproject.com/weblog/2024/dec/04/security-releases/
_____________________________________________________________________


Django security releases issued: 5.1.4, 5.0.10, and 4.2.17
Posted by Sarah Boyce on 4 décembre 2024

In accordance with our security release policy, the Django team is
issuing releases for Django 5.1.4, Django 5.0.10, and Django 4.2.17.
These releases address the security issues detailed below. We
encourage all users of Django to upgrade as soon as possible.


CVE-2024-53907: Potential denial-of-service in 
django.utils.html.strip_tags()

The strip_tags() method and striptags template filter are subject to
a potential denial-of-service attack via certain inputs containing
large sequences of nested incomplete HTML entities.

Thanks to jiangniao for the report.

This issue has severity "moderate" according to the Django security
policy.


CVE-2024-53908: Potential SQL injection in HasKey(lhs, rhs) on Oracle

Direct usage of the django.db.models.fields.json.HasKey lookup on Oracle
is subject to SQL injection if untrusted data is used as a lhs value.
Applications that use the jsonfield.has_key lookup through
the __ syntax are unaffected.

Thanks to Seokchan Yoon for the report.

This issue has severity "high" according to the Django security policy.
Affected supported versions

      Django main
      Django 5.1
      Django 5.0
      Django 4.2


Resolution

Patches to resolve the issue have been applied to Django's main, 5.1,
5.0, and 4.2 branches. The patches may be obtained from the followin
   changesets.


CVE-2024-53907: Potential denial-of-service in 
django.utils.html.strip_tags()

      On the main branch
      On the 5.1 branch
      On the 5.0 branch
      On the 4.2 branch


CVE-2024-53908: Potential SQL injection in HasKey(lhs, rhs) on
Oracle

      On the main branch
      On the 5.1 branch
      On the 5.0 branch
      On the 4.2 branch

The following releases have been issued

      Django 5.1.4 (download Django 5.1.4 | 5.1.4 checksums)
      Django 5.0.10 (download Django 5.0.10 | 5.0.10 checksums)
      Django 4.2.17 (download Django 4.2.17 | 4.2.17 checksums)

The PGP key ID used for this release is Sarah Boyce: 3955B19851EA96EF
General notes regarding security reporting

As always, we ask that potential security issues be reported via
private email to security@djangoproject.com, and not via Django's
Trac instance, nor via the Django Forum, nor via the
django-developers list. Please see our security policies for
further information.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
