Search for vulnerabilities
Vulnerability details: VCID-psfg-va2d-aaae
Vulnerability ID VCID-psfg-va2d-aaae
Aliases BIT-2021-35042
BIT-django-2021-35042
CVE-2021-35042
GHSA-xpfp-f569-q3p2
PYSEC-2021-109
Summary Django 3.1.x before 3.1.13 and 3.2.x before 3.2.5 allows QuerySet.order_by SQL injection if order_by is untrusted input from a client of a web application.
Status Published
Exploitability 0.5
Weighted Severity 9.0
Risk 4.5
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 9.8 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35042.json
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.00255 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07069 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07069 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07069 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07069 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07069 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07069 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07069 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.07232 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
epss 0.24384 https://api.first.org/data/v1/epss?cve=CVE-2021-35042
rhbs high https://bugzilla.redhat.com/show_bug.cgi?id=1975918
cvssv3.1 7.3 https://docs.djangoproject.com/en/3.2/releases/security
generic_textual HIGH https://docs.djangoproject.com/en/3.2/releases/security
generic_textual Medium https://docs.djangoproject.com/en/3.2/releases/security/
cvssv3.1_qr CRITICAL https://github.com/advisories/GHSA-xpfp-f569-q3p2
cvssv3.1 3.7 https://github.com/django/django
generic_textual MODERATE https://github.com/django/django
cvssv3.1 9.8 https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9
generic_textual CRITICAL https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9
cvssv3.1 9.8 https://github.com/django/django/commit/a34a5f724c5d5adb2109374ba3989ebb7b11f81f
generic_textual CRITICAL https://github.com/django/django/commit/a34a5f724c5d5adb2109374ba3989ebb7b11f81f
cvssv3.1 9.8 https://github.com/django/django/commit/dae83a24519d6f284c74414e0b81d64d9b5a0db4
generic_textual CRITICAL https://github.com/django/django/commit/dae83a24519d6f284c74414e0b81d64d9b5a0db4
cvssv3.1 9.8 https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-109.yaml
generic_textual CRITICAL https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-109.yaml
cvssv3.1 3.7 https://groups.google.com/forum/#%21forum/django-announce
generic_textual MODERATE https://groups.google.com/forum/#%21forum/django-announce
cvssv3.1 7.5 https://groups.google.com/forum/#!forum/django-announce
generic_textual HIGH https://groups.google.com/forum/#!forum/django-announce
cvssv3.1 9.8 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y
generic_textual CRITICAL https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y
cvssv2 7.5 https://nvd.nist.gov/vuln/detail/CVE-2021-35042
cvssv3 9.8 https://nvd.nist.gov/vuln/detail/CVE-2021-35042
cvssv3.1 9.8 https://nvd.nist.gov/vuln/detail/CVE-2021-35042
archlinux High https://security.archlinux.org/AVG-2123
cvssv3.1 9.8 https://security.netapp.com/advisory/ntap-20210805-0008
generic_textual CRITICAL https://security.netapp.com/advisory/ntap-20210805-0008
cvssv3.1 9.8 https://www.djangoproject.com/weblog/2021/jul/01/security-releases
generic_textual CRITICAL https://www.djangoproject.com/weblog/2021/jul/01/security-releases
cvssv3.1 9.8 https://www.openwall.com/lists/oss-security/2021/07/02/2
generic_textual CRITICAL https://www.openwall.com/lists/oss-security/2021/07/02/2
Reference id Reference type URL
https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35042.json
https://api.first.org/data/v1/epss?cve=CVE-2021-35042
https://docs.djangoproject.com/en/3.2/releases/security
https://docs.djangoproject.com/en/3.2/releases/security/
https://github.com/django/django
https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9
https://github.com/django/django/commit/a34a5f724c5d5adb2109374ba3989ebb7b11f81f
https://github.com/django/django/commit/dae83a24519d6f284c74414e0b81d64d9b5a0db4
https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-109.yaml
https://groups.google.com/forum/#%21forum/django-announce
https://groups.google.com/forum/#!forum/django-announce
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y/
https://security.netapp.com/advisory/ntap-20210805-0008
https://security.netapp.com/advisory/ntap-20210805-0008/
https://www.djangoproject.com/weblog/2021/jul/01/security-releases
https://www.djangoproject.com/weblog/2021/jul/01/security-releases/
https://www.openwall.com/lists/oss-security/2021/07/02/2
1975918 https://bugzilla.redhat.com/show_bug.cgi?id=1975918
ASA-202107-11 https://security.archlinux.org/ASA-202107-11
AVG-2123 https://security.archlinux.org/AVG-2123
cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:djangoproject:django:*:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:* https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
CVE-2021-35042 https://nvd.nist.gov/vuln/detail/CVE-2021-35042
GHSA-xpfp-f569-q3p2 https://github.com/advisories/GHSA-xpfp-f569-q3p2
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-35042.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L Found at https://docs.djangoproject.com/en/3.2/releases/security
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/django/django
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/django/django/commit/0bd57a879a0d54920bb9038a732645fb917040e9
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/django/django/commit/a34a5f724c5d5adb2109374ba3989ebb7b11f81f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/django/django/commit/dae83a24519d6f284c74414e0b81d64d9b5a0db4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2021-109.yaml
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://groups.google.com/forum/#%21forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Found at https://groups.google.com/forum/#!forum/django-announce
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SS6NJTBYWOX6J7G4U3LUOILARJKWPQ5Y
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P Found at https://nvd.nist.gov/vuln/detail/CVE-2021-35042
Exploitability (E) Access Vector (AV) Access Complexity (AC) Authentication (Au) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

high

functional

unproven

proof_of_concept

not_defined

local

adjacent_network

network

high

medium

low

multiple

single

none

none

partial

complete

none

partial

complete

none

partial

complete

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-35042
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://nvd.nist.gov/vuln/detail/CVE-2021-35042
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://security.netapp.com/advisory/ntap-20210805-0008
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.djangoproject.com/weblog/2021/jul/01/security-releases
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Found at https://www.openwall.com/lists/oss-security/2021/07/02/2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.65769
EPSS Score 0.00255
Published At Nov. 1, 2024, midnight
Date Actor Action Source VulnerableCode Version
There are no relevant records.