CVE-2020-13596

NameCVE-2020-13596
DescriptionAn issue was discovered in Django 2.2 before 2.2.13 and 3.0 before 3.0.7. Query parameters generated by the Django admin ForeignKeyRawIdWidget were not properly URL encoded, leading to a possibility of an XSS attack.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-2233-1, DSA-4705-1
Debian Bugs962323

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
python-django (PTS)jessie, jessie (lts)1.7.11-1+deb8u17fixed
stretch (security)1:1.10.7-2+deb9u17fixed
stretch (lts), stretch1:1.10.7-2+deb9u23fixed
buster, buster (lts)1:1.11.29-1+deb10u12fixed
buster (security)1:1.11.29-1+deb10u11fixed
bullseye (security), bullseye2:2.2.28-1~deb11u2fixed
bookworm (security), bookworm3:3.2.19-1+deb12u1fixed
sid, trixie3:4.2.16-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
python-djangosourcewheezy(unfixed)end-of-life
python-djangosourcejessie1.7.11-1+deb8u9DLA-2233-1
python-djangosourcestretch1:1.10.7-2+deb9u9DSA-4705-1
python-djangosourcebuster1:1.11.29-1~deb10u1DSA-4705-1
python-djangosource(unstable)2:2.2.13-1962323

Notes

https://www.openwall.com/lists/oss-security/2020/06/03/1
https://github.com/django/django/commit/2dd4d110c159d0c81dff42eaead2c378a0998735 (master)
https://github.com/django/django/commit/49d7cc19e33a104bb23f7ae1dbb1240b4f6c40f9 (3.1 branch)
https://github.com/django/django/commit/1f2dd37f6fcefdd10ed44cb233b2e62b520afb38 (3.0 branch)
https://github.com/django/django/commit/6d61860b22875f358fac83d903dc629897934815 (2.2. branch)

Search for package or bug name: Reporting problems