mirror of https://github.com/django/django.git
[2.2.x] Fixed CVE-2022-28346 -- Protected QuerySet.annotate(), aggregate(), and extra() against SQL injection in column aliases.
Thanks Splunk team: Preston Elder, Jacob Davis, Jacob Moore,
Matt Hanson, David Briggs, and a security researcher: Danylo Dmytriiev
(DDV_UA) for the report.
Backport of 93cae5cb2f
from main.
This commit is contained in:
parent
8352b98e46
commit
2c09e68ec9
|
@ -8,6 +8,7 @@ all about the internals of models in order to get the information it needs.
|
|||
"""
|
||||
import difflib
|
||||
import functools
|
||||
import re
|
||||
from collections import Counter, OrderedDict, namedtuple
|
||||
from collections.abc import Iterator, Mapping
|
||||
from itertools import chain, count, product
|
||||
|
@ -40,6 +41,10 @@ from django.utils.tree import Node
|
|||
|
||||
__all__ = ['Query', 'RawQuery']
|
||||
|
||||
# Quotation marks ('"`[]), whitespace characters, semicolons, or inline
|
||||
# SQL comments are forbidden in column aliases.
|
||||
FORBIDDEN_ALIAS_PATTERN = re.compile(r"['`\"\]\[;\s]|--|/\*|\*/")
|
||||
|
||||
|
||||
def get_field_names_from_opts(opts):
|
||||
return set(chain.from_iterable(
|
||||
|
@ -994,8 +999,16 @@ class Query:
|
|||
alias = seen[int_model] = join_info.joins[-1]
|
||||
return alias or seen[None]
|
||||
|
||||
def check_alias(self, alias):
|
||||
if FORBIDDEN_ALIAS_PATTERN.search(alias):
|
||||
raise ValueError(
|
||||
"Column aliases cannot contain whitespace characters, quotation marks, "
|
||||
"semicolons, or SQL comments."
|
||||
)
|
||||
|
||||
def add_annotation(self, annotation, alias, is_summary=False):
|
||||
"""Add a single annotation expression to the Query."""
|
||||
self.check_alias(alias)
|
||||
annotation = annotation.resolve_expression(self, allow_joins=True, reuse=None,
|
||||
summarize=is_summary)
|
||||
self.append_annotation_mask([alias])
|
||||
|
@ -1873,6 +1886,7 @@ class Query:
|
|||
else:
|
||||
param_iter = iter([])
|
||||
for name, entry in select.items():
|
||||
self.check_alias(name)
|
||||
entry = str(entry)
|
||||
entry_params = []
|
||||
pos = entry.find("%s")
|
||||
|
|
|
@ -5,3 +5,11 @@ Django 2.2.28 release notes
|
|||
*April 11, 2022*
|
||||
|
||||
Django 2.2.28 fixes two security issues with severity "high" in 2.2.27.
|
||||
|
||||
CVE-2022-28346: Potential SQL injection in ``QuerySet.annotate()``, ``aggregate()``, and ``extra()``
|
||||
====================================================================================================
|
||||
|
||||
:meth:`.QuerySet.annotate`, :meth:`~.QuerySet.aggregate`, and
|
||||
:meth:`~.QuerySet.extra` methods were subject to SQL injection in column
|
||||
aliases, using a suitably crafted dictionary, with dictionary expansion, as the
|
||||
``**kwargs`` passed to these methods.
|
||||
|
|
|
@ -1114,3 +1114,12 @@ class AggregateTestCase(TestCase):
|
|||
Book.objects.aggregate(is_book=True)
|
||||
with self.assertRaisesMessage(TypeError, msg % ', '.join([str(FloatField()), 'True'])):
|
||||
Book.objects.aggregate(FloatField(), Avg('price'), is_book=True)
|
||||
|
||||
def test_alias_sql_injection(self):
|
||||
crafted_alias = """injected_name" from "aggregation_author"; --"""
|
||||
msg = (
|
||||
"Column aliases cannot contain whitespace characters, quotation marks, "
|
||||
"semicolons, or SQL comments."
|
||||
)
|
||||
with self.assertRaisesMessage(ValueError, msg):
|
||||
Author.objects.aggregate(**{crafted_alias: Avg("age")})
|
||||
|
|
|
@ -598,3 +598,37 @@ class NonAggregateAnnotationTestCase(TestCase):
|
|||
total_books=Subquery(long_books_qs, output_field=IntegerField()),
|
||||
).values('name')
|
||||
self.assertCountEqual(publisher_books_qs, [{'name': 'Sams'}, {'name': 'Morgan Kaufmann'}])
|
||||
|
||||
def test_alias_sql_injection(self):
|
||||
crafted_alias = """injected_name" from "annotations_book"; --"""
|
||||
msg = (
|
||||
"Column aliases cannot contain whitespace characters, quotation marks, "
|
||||
"semicolons, or SQL comments."
|
||||
)
|
||||
with self.assertRaisesMessage(ValueError, msg):
|
||||
Book.objects.annotate(**{crafted_alias: Value(1)})
|
||||
|
||||
def test_alias_forbidden_chars(self):
|
||||
tests = [
|
||||
'al"ias',
|
||||
"a'lias",
|
||||
"ali`as",
|
||||
"alia s",
|
||||
"alias\t",
|
||||
"ali\nas",
|
||||
"alias--",
|
||||
"ali/*as",
|
||||
"alias*/",
|
||||
"alias;",
|
||||
# [] are used by MSSQL.
|
||||
"alias[",
|
||||
"alias]",
|
||||
]
|
||||
msg = (
|
||||
"Column aliases cannot contain whitespace characters, quotation marks, "
|
||||
"semicolons, or SQL comments."
|
||||
)
|
||||
for crafted_alias in tests:
|
||||
with self.subTest(crafted_alias):
|
||||
with self.assertRaisesMessage(ValueError, msg):
|
||||
Book.objects.annotate(**{crafted_alias: Value(1)})
|
||||
|
|
|
@ -27,6 +27,15 @@ class ValuesExpressionsTests(TestCase):
|
|||
[{'salary': 10}, {'salary': 20}, {'salary': 30}],
|
||||
)
|
||||
|
||||
def test_values_expression_alias_sql_injection(self):
|
||||
crafted_alias = """injected_name" from "expressions_company"; --"""
|
||||
msg = (
|
||||
"Column aliases cannot contain whitespace characters, quotation marks, "
|
||||
"semicolons, or SQL comments."
|
||||
)
|
||||
with self.assertRaisesMessage(ValueError, msg):
|
||||
Company.objects.values(**{crafted_alias: F("ceo__salary")})
|
||||
|
||||
def test_values_expression_group_by(self):
|
||||
# values() applies annotate() first, so values selected are grouped by
|
||||
# id, not firstname.
|
||||
|
|
|
@ -1737,6 +1737,15 @@ class Queries5Tests(TestCase):
|
|||
'bar %s'
|
||||
)
|
||||
|
||||
def test_extra_select_alias_sql_injection(self):
|
||||
crafted_alias = """injected_name" from "queries_note"; --"""
|
||||
msg = (
|
||||
"Column aliases cannot contain whitespace characters, quotation marks, "
|
||||
"semicolons, or SQL comments."
|
||||
)
|
||||
with self.assertRaisesMessage(ValueError, msg):
|
||||
Note.objects.extra(select={crafted_alias: "1"})
|
||||
|
||||
|
||||
class SelectRelatedTests(TestCase):
|
||||
def test_tickets_3045_3288(self):
|
||||
|
|
Loading…
Reference in New Issue