CVE-2014-0474: Django Vulnerable to MySQL Injection
(updated )
The (1) FilePathField, (2) GenericIPAddressField, and (3) IPAddressField model field classes in Django before 1.4.11, 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 do not properly perform type conversion, which allows remote attackers to have unspecified impact and vectors, related to “MySQL typecasting.”
References
- github.com/advisories/GHSA-wqjj-hx84-v449
- github.com/django/django
- github.com/django/django/commit/5f0829a27e85d89ad8c433f5c6a7a7d17c9e9292
- github.com/django/django/commit/985434fb1d6bf2335bf96c6ebf91c3674f1f399f
- github.com/django/django/commit/aa80f498de6d687e613860933ac58433ab71ea4b
- github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2014-3.yaml
- nvd.nist.gov/vuln/detail/CVE-2014-0474
- www.djangoproject.com/weblog/2014/apr/21/security
Detect and mitigate CVE-2014-0474 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →