Changes between Version 9 and Version 10 of SecurityTeam


Ignore:
Timestamp:
Oct 3, 2025, 1:49:12 PM (31 hours ago)
Author:
Natalia Bidart
Comment:

Added canned response for extra, raw, and RawSQL. Thanks charettes for the text.

Legend:

Unmodified
Added
Removed
Modified
  • SecurityTeam

    v9 v10  
    7676[1] https://docs.djangoproject.com/en/stable/internals/security/#how-does-django-evaluate-a-report
    7777
     78=== SQL Injection via extra, raw or RawSQL ===
     79
     80Hello!
     81
     82Thank you for taking the time to submit your discoveries responsibly.
     83
     84After reviewing your report, we have concluded that it does not constitute a security issue. The behavior presented relies on the use of `QuerySet.extra`, `QuerySet.raw`, or `RawSQL` expressions, which are explicitly designed to execute arbitrary SQL. These APIs are documented to require that user-controllable input be passed via `params` as shown below:
     85
     86* https://docs.djangoproject.com/en/stable/ref/models/querysets/#django.db.models.query.QuerySet.extra
     87* https://docs.djangoproject.com/en/stable/ref/models/querysets/#raw
     88* https://docs.djangoproject.com/en/stable/ref/models/expressions/#raw-sql-expressions
     89
     90Recently addressed issues such as CVE-2025-59681 differ from your report since that class of issue concerns identifier escaping, whereas your report concerns value escaping. For raw SQL query APIs, responsibility for distinguishing between code (SQL) and data (user input) rests with the developer.
     91
     92For further clarification, please see our documentation on performing raw SQL queries: https://docs.djangoproject.com/en/stable/topics/db/sql/#performing-raw-sql-queries
     93
     94Best,
     95Django Security Team.
     96
    7897=== Unauthenticated cache purge ===
    7998
Back to Top